We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
2 parents 16e7b52 + 212d7ad commit e3245f5Copy full SHA for e3245f5
doc/scalar/riscv-crypto-scalar-zkt.adoc
@@ -81,7 +81,7 @@ influences a branch or is used for a table lookup.
81
_security by design_ against basic timing attacks can usually be achieved via
82
conscious implementation (of relevant iterative multi-cycle instructions or
83
instructions composed of micro-ops) in way that avoids data-dependant latency.
84
-* Laboratory testing may utilize statisticial timing attack leakage analysis
+* Laboratory testing may utilize statistical timing attack leakage analysis
85
techniques such as those described in ISO/IEC 17825 cite:[IS16].
86
* Binary executables should not contain secrets in the instruction encodings
87
(Kerckhoffs's principle), so instruction timing may leak information about
0 commit comments