--- Day changed Fri Jun 30 2017 03:57 -!- SopaXorzTaker [~SopaXorzT@unaffiliated/sopaxorztaker] has joined #secp256k1 07:16 -!- so [~so@unaffiliated/so] has quit [Ping timeout: 240 seconds] 07:23 -!- so [~so@unaffiliated/so] has joined #secp256k1 09:13 -!- SopaXorzTaker [~SopaXorzT@unaffiliated/sopaxorztaker] has quit [Ping timeout: 260 seconds] 09:20 -!- SopaXorzTaker [~SopaXorzT@unaffiliated/sopaxorztaker] has joined #secp256k1 10:13 < SopaXorzTaker> How are public keys decompressed? 10:13 < SopaXorzTaker> (or are they?) 10:14 < SopaXorzTaker> I mean, ECDSA only uses K.x 10:24 < sipa> solve the equation 10:25 < sipa> y^2 = x^3 + 7 10:25 < sipa> so y is sqrt(x^3 + 7) 10:26 < sipa> also, ECDSA does not need decompression 10:26 < sipa> just recompute K and compare the x coordinate 13:06 -!- SopaXorzTaker [~SopaXorzT@unaffiliated/sopaxorztaker] has quit [Remote host closed the connection] 17:13 -!- Netsplit *.net <-> *.split quits: arubi 17:20 -!- arubi [~ese168@gateway/tor-sasl/ese168] has joined #secp256k1 17:49 -!- arubi [~ese168@gateway/tor-sasl/ese168] has quit [Ping timeout: 248 seconds] 18:03 -!- arubi [~ese168@gateway/tor-sasl/ese168] has joined #secp256k1