We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 61b2ad3 commit 74a9dbfCopy full SHA for 74a9dbf
doc/security/cryptolib/security.md
@@ -66,7 +66,7 @@ The following software-based countermeasures are implemented:
66
67
### RSA
68
Modular exponentiation is the core operation for both RSA encryption/sign and key generation.
69
-It is implemented as a constant-time Montgomery Ladder with Boolean-masked exponents and blinded base points as detailed in the following works:
+It is implemented as a constant-time Montgomery Ladder with Boolean-masked exponents and blinded message as detailed in the following works:
70
71
- https://eprint.iacr.org/2018/1226.pdf
72
- https://dl.acm.org/doi/10.1145/1873548.1873556
0 commit comments