| @@ -1,3 +1,15 @@ | |||||
| July 13, 2022: | |||||
| Fix a security bug and an issue. | |||||
| Point::steg_encode was leaving the 24 high bits of the buffer as zero. | |||||
| It also ignored the size parameter. The size parameter has now been removed, | |||||
| the zeros fixed and a test added to make sure that it is fixed. | |||||
| Per https://github.com/MystenLabs/ed25519-unsafe-libs, deprecate eddsa signing | |||||
| with separate pubkey and privkey input. Instead decaf_ed*_keypair_sign. | |||||
| Release v1.0.2. | |||||
| October 10, 2020: | October 10, 2020: | ||||
| A paper by Konstantinos Chalkias, François Garillot, and Valeria | A paper by Konstantinos Chalkias, François Garillot, and Valeria | ||||
| Nikolaenko, to be found at: | Nikolaenko, to be found at: | ||||
| @@ -10,7 +22,7 @@ October 10, 2020: | |||||
| an attacker could modify an existing valid signature to create a | an attacker could modify an existing valid signature to create a | ||||
| new signature that is still valid, but only for the same message. | new signature that is still valid, but only for the same message. | ||||
| Releave v1.0.1, correcting this flaw. | |||||
| Release v1.0.1, correcting this flaw. | |||||
| July 12, 2018: | July 12, 2018: | ||||
| Release 1.0 with Johan Pascal's build scripts. | Release 1.0 with Johan Pascal's build scripts. | ||||