This task was abandoned by me a couple of years back. Elementary security difficulties inside the technology of private keys happen to be introduced to my focus. See: #sixty one @BorisK your function converts an existing private important to some general public critical. Although not every single random hex string https://vasilieviche062nwf8.answerblogs.com/profile