diff options
| author | J08nY | 2025-03-08 19:49:21 +0100 |
|---|---|---|
| committer | J08nY | 2025-03-08 19:49:21 +0100 |
| commit | 6fcfde015b74257f848eca67f564ff60ef3e4661 (patch) | |
| tree | 4725e1e5a318fbc6c681768d94b9af4646871e28 /pyecsca/sca | |
| parent | eaadd3e8a271fdbc0f6c409826d814fde7f9ef28 (diff) | |
| download | pyecsca-6fcfde015b74257f848eca67f564ff60ef3e4661.tar.gz pyecsca-6fcfde015b74257f848eca67f564ff60ef3e4661.tar.zst pyecsca-6fcfde015b74257f848eca67f564ff60ef3e4661.zip | |
Diffstat (limited to 'pyecsca/sca')
| -rw-r--r-- | pyecsca/sca/re/rpa.py | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/pyecsca/sca/re/rpa.py b/pyecsca/sca/re/rpa.py index 395f698..b8ed88c 100644 --- a/pyecsca/sca/re/rpa.py +++ b/pyecsca/sca/re/rpa.py @@ -1,6 +1,7 @@ """ Provides functionality inspired by the Refined-Power Analysis attack by Goubin [RPA]_. """ + from copy import copy, deepcopy from public import public @@ -21,7 +22,8 @@ from pyecsca.ec.formula import ( TriplingFormula, NegationFormula, DifferentialAdditionFormula, - LadderFormula, ) + LadderFormula, +) from pyecsca.ec.mod import Mod, mod from pyecsca.ec.mult import ( ScalarMultiplicationAction, @@ -390,7 +392,7 @@ def multiples_computed( mult_class: Type[ScalarMultiplier], mult_factory: Callable, use_init: bool = False, - use_multiply: bool = True + use_multiply: bool = True, ) -> set[int]: """ Compute the multiples computed for a given scalar and multiplier (quickly). @@ -419,5 +421,3 @@ def multiples_computed( mult.multiply(scalar) return set(ctx.points.values()) - {0} - - |
