diff options
| -rw-r--r-- | README.md | 2 | ||||
| -rw-r--r-- | docs/index.rst | 2 | ||||
| -rw-r--r-- | pyproject.toml | 2 |
3 files changed, 3 insertions, 3 deletions
@@ -14,7 +14,7 @@ about a black-box implementation of ECC through side-channels. The main goal of is to be able to reverse engineer the curve model, coordinate system, addition formulas, scalar multiplier and even finite-field implementation details. -It is currently in an alpha stage of development and thus only provides: +It currently provides: - Enumeration of millions of possible ECC implementation configurations (see [notebook/configuration_space](https://neuromancer.sk/pyecsca/notebook/configuration_space.html)) - Simulation and execution tracing of key generation, ECDH and ECDSA (see [notebook/simulation](https://neuromancer.sk/pyecsca/notebook/simulation.html)) - Synthesis of C implementations of ECC for embedded devices, given any implementation configuration (see [notebook/codegen](https://neuromancer.sk/pyecsca/notebook/codegen.html)), diff --git a/docs/index.rst b/docs/index.rst index ac942cf..0b74ad5 100644 --- a/docs/index.rst +++ b/docs/index.rst @@ -24,7 +24,7 @@ about a black-box implementation of ECC through side-channels. The main goal of is to be able to reverse engineer the curve model, coordinate system, addition formulas, scalar multiplier and even finite-field implementation details. -It is currently in an alpha stage of development and thus only provides: +It currently provides: .. card:: Enumeration diff --git a/pyproject.toml b/pyproject.toml index 22c37d5..285cd76 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -16,7 +16,7 @@ readme = "README.md" license = { "text" = "MIT" } classifiers = [ - "Development Status :: 3 - Alpha", + "Development Status :: 4 - Beta", "License :: OSI Approved :: MIT License", "Topic :: Security", "Topic :: Security :: Cryptography", |
