diff options
| author | J08nY | 2025-09-29 11:34:35 +0200 |
|---|---|---|
| committer | J08nY | 2025-09-29 11:34:35 +0200 |
| commit | f92fef4992a32bbc22f5a2ec35328f106878cbd0 (patch) | |
| tree | 209da3ed61f8568247668567b358675eefcf9476 | |
| parent | 8dc614fb3422f348f1616993f41fb64e35c35eac (diff) | |
| download | pyecsca-f92fef4992a32bbc22f5a2ec35328f106878cbd0.tar.gz pyecsca-f92fef4992a32bbc22f5a2ec35328f106878cbd0.tar.zst pyecsca-f92fef4992a32bbc22f5a2ec35328f106878cbd0.zip | |
Add artifact note.
Diffstat (limited to '')
| -rw-r--r-- | README.md | 3 |
1 files changed, 3 insertions, 0 deletions
@@ -6,6 +6,9 @@ For more info, see the [](https://pyecsca.org/). +> [!NOTE] +> The artifact for the CHES 2024 paper "*pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis*" is in a different repository: [pyecsca-artifact](https://github.com/J08nY/pyecsca-artifact). + ## Functionality **pyecsca** aims to fill a gap in SCA tooling for Elliptic Curve Cryptography, it focuses on |
