cdfd73aa7f
Signed-off-by: Janos Follath <janos.follath@arm.com>
6 lines
399 B
Text
6 lines
399 B
Text
Security
|
|
* An adversary with access to precise enough timing information (typically, a
|
|
co-located process) could recover a Curve25519 or Curve448 static ECDH key
|
|
after inputting a chosen public key and observing the victim performing the
|
|
corresponding private-key operation. Found and reported by Leila Batina,
|
|
Lukas Chmielewski, Björn Haase, Niels Samwel and Peter Schwabe.
|