diff options
author | Thai Duong <thaidn@gmail.com> | 2016-12-04 21:32:40 -0800 |
---|---|---|
committer | Thai Duong <thaidn@gmail.com> | 2016-12-04 21:32:40 -0800 |
commit | 625f91ce32d5831dbd3d46b1549ce73781a35807 (patch) | |
tree | aca3c3889e4e56737e4134e06625e8231359ec20 | |
parent | b1b22bc6c0cc99aab75f55372e070bac3d40082d (diff) | |
download | wycheproof-625f91ce32d5831dbd3d46b1549ce73781a35807.tar.gz |
Add CREDITS
-rw-r--r-- | CREDITS.md | 4 | ||||
-rw-r--r-- | README.md | 5 |
2 files changed, 7 insertions, 2 deletions
diff --git a/CREDITS.md b/CREDITS.md new file mode 100644 index 0000000..d49f87d --- /dev/null +++ b/CREDITS.md @@ -0,0 +1,4 @@ +- Daniel Bleichenbacher +- Thai Duong +- Emilia Kasper +- Quan Nguyen @@ -10,8 +10,8 @@ climb it.* ## Introduction Project Wycheproof tests crypto libraries against known attacks. It is developed -and maintained by members of Google Security Team, but it is not an official -Google product. +and maintained by [members of Google Security Team](CREDITS.md), but it is not +an official Google product. At Google, we rely on many third party cryptographic software libraries. Unfortunately, in cryptography, subtle mistakes can have catastrophic @@ -129,6 +129,7 @@ Project Wycheproof: - Bouncy Castle's ECDHC leaks private keys - Test: testModifiedPublic in [EcdhTest](https://github.com/google/wycheproof/blob/master/java/com/google/security/wycheproof/testcases/EcdhTest.java). + ### Contact and mailing list If you want to contribute, please read [CONTRIBUTING](CONTRIBUTING.md) and send |