--- Log opened Tue Mar 05 00:00:07 2019 08:18 < sipa> this looks potentially interesting (i haven't read the paper): Check out @hashbreaker’s Tweet: https://twitter.com/hashbreaker/status/1102957919392419840 09:11 -!- arubi [~ese168@gateway/tor-sasl/ese168] has quit [Remote host closed the connection] 09:11 -!- arubi [~ese168@gateway/tor-sasl/ese168] has joined #secp256k1 09:45 < gmaxwell> sipa: the paper has code in sage. 09:48 < gmaxwell> maybe we should try implementing it in minisketch, simpler there. :P 09:57 < nsh> nice 14:57 -!- afk11 [~afk11@79.97.107.223] has joined #secp256k1 14:57 -!- afk11 [~afk11@79.97.107.223] has quit [Changing host] 14:57 -!- afk11 [~afk11@unaffiliated/afk11] has joined #secp256k1 15:07 < gmaxwell> ... djb's python ed25519 code uses double-and-add: http://ed25519.cr.yp.to/python/ed25519.py 15:07 < gmaxwell> I'm thinking of emailing him and asking him to retract some of his public claims about 25519's inherent safty, when even his own code isn't constant time. 15:08 < gmaxwell> (noticed it because I wanted a replacement for VB's lol-vulnerable ed25519 code which recently went offline, found lots of python stuff using this: https://github.com/warner/python-pure25519/blame/master/misc/djbec.py (which is also double and add) and then noticed it credits the above DJB version .... 16:22 -!- afk11 [~afk11@unaffiliated/afk11] has quit [Ping timeout: 244 seconds] 16:37 -!- afk11 [~afk11@79.97.107.223] has joined #secp256k1 19:09 -!- afk11 [~afk11@79.97.107.223] has quit [Changing host] 19:09 -!- afk11 [~afk11@unaffiliated/afk11] has joined #secp256k1 --- Log closed Wed Mar 06 00:00:07 2019