It’s yet another example of how infuriating computer security is, especially side-channel attacks. All that work into constant-time crypto, and then this… As the saying goes: “constants aren’t.”
It’s yet another example of how infuriating computer security is, especially side-channel attacks. All that work into constant-time crypto, and then this… As the saying goes: “constants aren’t.”