This undertaking was abandoned by me a couple of a long time ago. Fundamental protection challenges while in the technology of private keys have already been introduced to my awareness. See: #61 Simplifying, to create a set of asymmetric keys a random number is fed into a math perform which https://freedirectory4u.com/listings12701012/the-greatest-guide-to-op-address