Jacob Bachmeyer wrote:
> That raises another question:  is the modular reduction (or more 
> importantly its bypass if unneeded) constant-time?  In other words, is 
> the choice of "use intermediate result (0<X<P) as-is" or "reduce 
> intermediate result (P<X<2*P)" constant-time?  (It should already be; 
> this would be a fairly severe timing leak if it is not.)

In the context of ECDSA (Weierstrass curve), for NIST curves and
secp256k1, it's constant-time.  For other curves, it's good to have
constant-time implementation, but this goal has not been achieved in
libgcrypt yet.
-- 

_______________________________________________
Gcrypt-devel mailing list
Gcrypt-devel@gnupg.org
https://lists.gnupg.org/mailman/listinfo/gcrypt-devel

Reply via email to