Bounties for breaking RSA Assumptions

To improve the cryptanalysis of new RSA assumptions needed for Verifiable Delay Functions (VDFs), in addition to the previous paper bounties, the Ethereum Foundation announced the following bounties for solving concrete instances of the adaptive root problem at the Stanford Blockchain Conference 2020:

Challenge 0

Modulus:  0xbdbbd27309fc78576ef48a2ed1fd835f9a35c4b23ab4191d476fc54245a04c588af
1c7b600c5009bcc064b58afa126aa49eca0c7dc02a92b1750b833172e85226e88290494fc11f1fd
3e78e788e5  
Bounty:  1 ETH  

Challenge 1

Modulus:  0x7e50b8b8b973dd6422b77048168d24729c96c1144b4982a7871598af00fd908d485
41594d47bc80ae03db5ca666f8ceff7d36bafeff7701d0de71a79b552fac7a431928761a42d8186
97920a0c8274100fe3950fd2591c50888432c685ac2d5f  
Bounty:  4 ETH  

Challenge 2

Modulus:  0xa8046dd12415b1ccf11d841a39a39287bf2c761c7779e8bfef7fa7886793ea326b9
ecc7c4cb600688595e64b26ee45685919473bc09862f8783d24fea6433decc2500f724f0c26b000
7f76af9cda8f9b3576acfa3206c3432f03358184259dbbd813032cfb21634d6df7957a1bf1676ae
b90750d85f6715c351c595a14fe373b  
Bounty:  8 ETH  

Challenge 3

Modulus:  0x7efce54e174bb141d000b4375659f45ac1e3e9ccc1afcde85cc98b7b6ce62645736
1e90d1d9fe0af72ba63f3b0d20af8084bd6f981584af1e9197288811e72afaf488a1360e4d5d6f9
b08220e16dd05860bd571e3171eb10dcc60241bf6f64cf03ddfb0556aa9a61e9850874e442564c0
20cf283813f5215d36281748b766ffa8a3486cd70686b5590d499a1a72d9baa87c0dc223c8f5b71
d18fd24888b2872f0530be8cde0f7be8f591848bc210f2966dcaab6853d09bfd550ebdcd244c394
cc83ac19ec75bf8b82774719555483cc2e3fbac3201c1aa518d25fdb37d50e56f3515ad5e4609d2
52fa7ded3b5123c0abc8a0ce137ef9989843d1452b87ccca6b  
Bounty:  16 ETH  

How to redeem

In order to redeem a bounty, you must be able to solve an instance of the adaptive root problem modulo the given modulus. The exact documentation on how to solve such an instance can be found in the readme to the contract repository.

The bounty contract is deployed at address 0x62A940646e8F9FCEAc28454414Bb6133a54055Ea on the Ethereum blockchain.

If you need help redeeming a bounty please write to dankrad@ethereum.org.