You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4-2Lines changed: 4 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -45,8 +45,10 @@ Implementation details
45
45
* Optionally (off by default) use secp256k1's efficiently-computable endomorphism to split the P multiplicand into 2 half-sized ones.
46
46
* Point multiplication for signing
47
47
* Use a precomputed table of multiples of powers of 16 multiplied with the generator, so general multiplication becomes a series of additions.
48
-
* Access the table with branch-free conditional moves so memory access is uniform.
49
-
* No data-dependent branches
48
+
* Intended to be completely free of timing sidechannels for secret-key operations (on reasonable hardware/toolchains)
49
+
* Access the table with branch-free conditional moves so memory access is uniform.
50
+
* No data-dependent branches
51
+
* Optional runtime blinding which attempts to frustrate differential power analysis.
50
52
* The precomputed tables add and eventually subtract points for which no known scalar (private key) is known, preventing even an attacker with control over the private key used to control the data internally.
0 commit comments