We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 2b58f12 commit 61b2ad3Copy full SHA for 61b2ad3
doc/security/cryptolib/security.md
@@ -55,6 +55,7 @@ The following software-based countermeasures are implemented:
55
- The exponentiation operates on projective coordinates with re-randomisation of the used additive points P and 2P on every iteration.
56
- Processing of the masked and blinded scalar is hardened against SCA leakage.
57
- We check if input points and results of EC scalar multiplications satisfy the curve equation.
58
+ - The base point and curve parameters are protected against manipulation though the CRC check upon loading the OTBN app.
59
- P384 uses the same countermeasures with a blinding factor of 194b instead of 65b.
60
61
### HMAC
0 commit comments