Reconstruction
What is Reconstruction?
Reconstruction is used after vanity-search or key-derivation processes where the found key is not the final private key, but a transformed version of it.
Some optimized secp256k1 search algorithms apply mathematical endomorphisms. As a result, the discovered key may require an additional transformation to recover the real private key that matches the target address.
This tool automatically generates 6 mathematically possible private-key candidates using secp256k1 mod-n arithmetic and endomorphism constants (λ₁, λ₂). For each candidate, public keys and addresses are derived.
If you provide a Target Address, the tool will automatically detect which candidate matches it — eliminating manual trial and error.
⚠️ This tool works with private keys. Use only test keys or keys you fully own.