diff options
author | Thai Duong <thaidn@gmail.com> | 2016-12-13 03:17:31 -0800 |
---|---|---|
committer | Thai Duong <thaidn@gmail.com> | 2016-12-13 03:17:31 -0800 |
commit | 223332fde6f83c6421c605189abe48a332da6a31 (patch) | |
tree | 9eeca2b20baddb8df1b05a4cca22a27d278afa73 /README.md | |
parent | 75efe2b665f6a05d8855ba727a69dc2f1469232b (diff) | |
download | wycheproof-223332fde6f83c6421c605189abe48a332da6a31.tar.gz |
Some last minute changes before public announcement.
Diffstat (limited to 'README.md')
-rw-r--r-- | README.md | 14 |
1 files changed, 11 insertions, 3 deletions
@@ -10,8 +10,8 @@ climb it.* ## Introduction Project Wycheproof tests crypto libraries against known attacks. It is developed -and maintained by [members of Google Security Team](AUTHORS.md), but it is not -an official Google product. +and maintained by members of Google Security Team, but it is not an official +Google product. At Google, we rely on many third party cryptographic software libraries. Unfortunately, in cryptography, subtle mistakes can have catastrophic @@ -127,9 +127,17 @@ Project Wycheproof: (https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0971). - Bouncy Castle's ECDHC leaks private keys - - Test: testModifiedPublic in + - Test: testModifiedPublic and testWrongOrderEcdhc in [EcdhTest](https://github.com/google/wycheproof/blob/master/java/com/google/security/wycheproof/testcases/EcdhTest.java). +### Maintainers + +Project Wycheproof is maintained by: +- Daniel Bleichenbacher +- Thai Duong +- Emilia Kasper +- Quan Nguyen + ### Contact and mailing list If you want to contribute, please read [CONTRIBUTING](CONTRIBUTING.md) and send |