aboutsummaryrefslogtreecommitdiffhomepage
path: root/pyecsca/ec/countermeasures.py
diff options
context:
space:
mode:
authorJ08nY2025-03-13 19:38:48 +0100
committerJ08nY2025-03-13 19:38:48 +0100
commit7c2f12a0111de33330870b2179b71281b59ada29 (patch)
tree80beb7f4e3090a4805d7aa20ffba5cbcc0078902 /pyecsca/ec/countermeasures.py
parenteccc58127b4c0c10f50e4d05e699d3585391e8a1 (diff)
downloadpyecsca-7c2f12a0111de33330870b2179b71281b59ada29.tar.gz
pyecsca-7c2f12a0111de33330870b2179b71281b59ada29.tar.zst
pyecsca-7c2f12a0111de33330870b2179b71281b59ada29.zip
Blacken.
Diffstat (limited to 'pyecsca/ec/countermeasures.py')
-rw-r--r--pyecsca/ec/countermeasures.py18
1 files changed, 15 insertions, 3 deletions
diff --git a/pyecsca/ec/countermeasures.py b/pyecsca/ec/countermeasures.py
index 19afb06..9fd743a 100644
--- a/pyecsca/ec/countermeasures.py
+++ b/pyecsca/ec/countermeasures.py
@@ -60,6 +60,7 @@ class GroupScalarRandomization(ScalarMultiplierCountermeasure):
&\textbf{return}\ [k + r n]G
"""
+
rand_bits: int
def __init__(self, mult: ScalarMultiplier, rand_bits: int = 32):
@@ -73,7 +74,11 @@ class GroupScalarRandomization(ScalarMultiplierCountermeasure):
def init(self, params: DomainParameters, point: Point):
self.params = params
self.point = point
- self.mult.init(self.params, self.point, bits=params.full_order.bit_length() + self.rand_bits)
+ self.mult.init(
+ self.params,
+ self.point,
+ bits=params.full_order.bit_length() + self.rand_bits,
+ )
def multiply(self, scalar: int) -> Point:
if self.params is None or self.point is None:
@@ -99,6 +104,7 @@ class AdditiveSplitting(ScalarMultiplierCountermeasure):
&\textbf{return}\ [k - r]G + [r]G
"""
+
add: Optional[AdditionFormula]
def __init__(self, mult: ScalarMultiplier, add: Optional[AdditionFormula] = None):
@@ -121,7 +127,9 @@ class AdditiveSplitting(ScalarMultiplierCountermeasure):
if self.add is None:
res = self.mult._add(R, S) # noqa: This is OK.
else:
- res = self.add(self.params.curve.prime, R, S, **self.params.curve.parameters)[0]
+ res = self.add(
+ self.params.curve.prime, R, S, **self.params.curve.parameters
+ )[0]
return action.exit(res)
@@ -140,6 +148,7 @@ class MultiplicativeSplitting(ScalarMultiplierCountermeasure):
&\textbf{return}\ [k r^{-1} \mod n]S
"""
+
rand_bits: int
def __init__(self, mult: ScalarMultiplier, rand_bits: int = 32):
@@ -180,6 +189,7 @@ class EuclideanSplitting(ScalarMultiplierCountermeasure):
&\textbf{return}\ [k_1]G + [k_2]S
"""
+
add: Optional[AdditionFormula]
def __init__(self, mult: ScalarMultiplier, add: Optional[AdditionFormula] = None):
@@ -208,5 +218,7 @@ class EuclideanSplitting(ScalarMultiplierCountermeasure):
if self.add is None:
res = self.mult._add(S, T) # noqa: This is OK.
else:
- res = self.add(self.params.curve.prime, S, T, **self.params.curve.parameters)[0]
+ res = self.add(
+ self.params.curve.prime, S, T, **self.params.curve.parameters
+ )[0]
return action.exit(res)