aboutsummaryrefslogtreecommitdiff
path: root/README.md
diff options
context:
space:
mode:
authorJ08nY2024-04-13 18:44:12 +0200
committerJ08nY2024-04-13 18:44:12 +0200
commitacc0878d612bd1f159d6a2139c80dba6f70f530e (patch)
treed5b5e3c27a005867b05614ceda987a49f3b5160e /README.md
parent9ac9717905b188f159c4256e16b934bb8c5d5d5b (diff)
downloadpyecsca-acc0878d612bd1f159d6a2139c80dba6f70f530e.tar.gz
pyecsca-acc0878d612bd1f159d6a2139c80dba6f70f530e.tar.zst
pyecsca-acc0878d612bd1f159d6a2139c80dba6f70f530e.zip
Diffstat (limited to 'README.md')
-rw-r--r--README.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md
index 652e67e..f99842d 100644
--- a/README.md
+++ b/README.md
@@ -14,7 +14,7 @@ about a black-box implementation of ECC through side-channels. The main goal of
is to be able to reverse engineer the curve model, coordinate system, addition formulas, scalar
multiplier and even finite-field implementation details.
-It is currently in an alpha stage of development and thus only provides:
+It currently provides:
- Enumeration of millions of possible ECC implementation configurations (see [notebook/configuration_space](https://neuromancer.sk/pyecsca/notebook/configuration_space.html))
- Simulation and execution tracing of key generation, ECDH and ECDSA (see [notebook/simulation](https://neuromancer.sk/pyecsca/notebook/simulation.html))
- Synthesis of C implementations of ECC for embedded devices, given any implementation configuration (see [notebook/codegen](https://neuromancer.sk/pyecsca/notebook/codegen.html)),