Skip to main content
10 events
when toggle format what by license comment
S May 26 at 6:46 history suggested Command Master
Add timing attack tag
May 25 at 9:15 review Suggested edits
S May 26 at 6:46
May 24 at 3:21 comment added swineone See discussion in a cryptographic context here: cic.iacr.org/p/1/2/14/pdf
May 23 at 11:36 comment added Melab @swineone How does it thwart timing attacks?
May 23 at 10:27 answer added Marc Ilunga timeline score: 1
May 22 at 23:14 comment added swineone You want this algorithm: arxiv.org/abs/1805.10941. Notes by someone trying to understand the algorithm: sts10.github.io/2020/10/10/…. Note that this method uses rejection sampling, so it's not strictly constant-time, but it does not leak timing data.
May 22 at 22:16 history became hot network question
May 22 at 19:57 comment added Paul Uszak Can we have a little bit more? Uniformly distributed whats?
May 22 at 17:40 answer added poncho timeline score: 12
May 22 at 14:15 history asked Melab CC BY-SA 4.0