diff options
| author | J08nY | 2025-10-03 12:50:48 +0200 |
|---|---|---|
| committer | J08nY | 2025-10-03 12:50:48 +0200 |
| commit | 9c2cba84bac32d3bbe3c6f946ee76dc416cd6bb8 (patch) | |
| tree | d4e9b9dfef98a79ef0d839e597904927b99e33e2 | |
| parent | 2ad8605e48ac95e656e32e5cfcbb2c2847a8b0ff (diff) | |
| download | pyecsca-9c2cba84bac32d3bbe3c6f946ee76dc416cd6bb8.tar.gz pyecsca-9c2cba84bac32d3bbe3c6f946ee76dc416cd6bb8.tar.zst pyecsca-9c2cba84bac32d3bbe3c6f946ee76dc416cd6bb8.zip | |
| -rw-r--r-- | pyecsca/ec/countermeasures.py | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/pyecsca/ec/countermeasures.py b/pyecsca/ec/countermeasures.py index eff10c2..a310ce4 100644 --- a/pyecsca/ec/countermeasures.py +++ b/pyecsca/ec/countermeasures.py @@ -148,7 +148,7 @@ class AdditiveSplitting(ScalarMultiplierCountermeasure): order = self.params.order r = Mod.random(order) s = scalar - r - bits = max(self.bits, order.bit_length()) + 1 + bits = max(self.bits, order.bit_length()) self.mult.init(self.params, self.point, bits) R = self.mult.multiply(int(r)) S = self.mult.multiply(int(s)) |
