aboutsummaryrefslogtreecommitdiffhomepage
path: root/README.md
diff options
context:
space:
mode:
authorJ08nY2025-09-29 11:34:35 +0200
committerJ08nY2025-09-29 11:34:35 +0200
commitf92fef4992a32bbc22f5a2ec35328f106878cbd0 (patch)
tree209da3ed61f8568247668567b358675eefcf9476 /README.md
parent8dc614fb3422f348f1616993f41fb64e35c35eac (diff)
downloadpyecsca-f92fef4992a32bbc22f5a2ec35328f106878cbd0.tar.gz
pyecsca-f92fef4992a32bbc22f5a2ec35328f106878cbd0.tar.zst
pyecsca-f92fef4992a32bbc22f5a2ec35328f106878cbd0.zip
Add artifact note.
Diffstat (limited to '')
-rw-r--r--README.md3
1 files changed, 3 insertions, 0 deletions
diff --git a/README.md b/README.md
index f11256d..faf59f3 100644
--- a/README.md
+++ b/README.md
@@ -6,6 +6,9 @@
For more info, see the [![docs](https://img.shields.io/badge/docs-pyecsca.org-black.svg)](https://pyecsca.org/).
+> [!NOTE]
+> The artifact for the CHES 2024 paper "*pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis*" is in a different repository: [pyecsca-artifact](https://github.com/J08nY/pyecsca-artifact).
+
## Functionality
**pyecsca** aims to fill a gap in SCA tooling for Elliptic Curve Cryptography, it focuses on