--- Day changed Fri May 12 2017 04:13 -!- SopaXorzTaker [~SopaXorzT@unaffiliated/sopaxorztaker] has joined #secp256k1 04:13 < SopaXorzTaker> Oh, hey 04:15 < SopaXorzTaker> https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm#Signature_generation_algorithm 04:15 < SopaXorzTaker> Step 6 is confusing 04:16 < SopaXorzTaker> how do I do an inverse multiplicative modulo of k? 04:16 < SopaXorzTaker> k^-1 is obviously not the reciprocal 04:16 < SopaXorzTaker> I promised myself not to look at any source code while writing my implementation 05:35 < SopaXorzTaker> guys? 05:36 < SopaXorzTaker> wumpus, maybe you can help? 06:54 < SopaXorzTaker> gmaxwell, sipa - anyone 06:55 < SopaXorzTaker> could you check my ECDSA implementation? 07:23 < sipa> learn math 07:36 < SopaXorzTaker> sipa, well 07:36 < SopaXorzTaker> my implementation passes the checks 07:37 < SopaXorzTaker> z=101313441018496298855616188252934726526525012911655317211406949275718146758767, rs=(57070398782371128983000456787184711215639354554405285546497405347058307477530, 92346005733029323245928209350756579443828373112295405064230273668599862922241), Q=(57070398782371128983000456787184711215639354554405285546497405347058307477530, 92346005733029323245928209350756579443828373112295405064230273668599862922241) 07:37 < SopaXorzTaker> the question is 07:37 < SopaXorzTaker> is that correct? 07:37 < SopaXorzTaker> where z is HASH(message) 07:37 < SopaXorzTaker> rs are r, s 07:37 < SopaXorzTaker> and Q is the public key 13:24 -!- SopaXorzTaker [~SopaXorzT@unaffiliated/sopaxorztaker] has quit [Read error: Connection reset by peer]