From a29eac035bf956465393f9bd50a7346317fc41b4 Mon Sep 17 00:00:00 2001 From: John Safranek Date: Thu, 16 Apr 2020 09:16:46 -0700 Subject: [PATCH] Update credit for vulnerability report. --- ChangeLog.md | 4 ++-- README | 4 ++-- README.md | 4 ++-- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/ChangeLog.md b/ChangeLog.md index 6417d0f57..7c60aebea 100644 --- a/ChangeLog.md +++ b/ChangeLog.md @@ -106,8 +106,8 @@ Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including: * For fast math, use a constant time modular inverse when mapping to affine when operation involves a private key - keygen, calc shared secret, sign. - Thank you to the Network and Information Security Group (NISEC) at - Tampere University for the report. + Thank you to the Alejandro Cabrera Aldaya, Cesar Pereida García, and + Billy Bob Brumley from Tampere University for the report. * Change constant time and cache resistant ECC mulmod. Ensure points being operated on change to make constant time. Thank you to Pietro Borrello at diff --git a/README b/README index 98d7ff9a0..ef8bb05fe 100644 --- a/README +++ b/README @@ -181,8 +181,8 @@ Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including: * For fast math, use a constant time modular inverse when mapping to affine when operation involves a private key - keygen, calc shared secret, sign. - Thank you to the Network and Information Security Group (NISEC) at - Tampere University for the report. + Thank you to the Alejandro Cabrera Aldaya, Cesar Pereida García, and + Billy Bob Brumley from Tampere University for the report. * Change constant time and cache resistant ECC mulmod. Ensure points being operated on change to make constant time. Thank you to Pietro Borrello at diff --git a/README.md b/README.md index 98d7ff9a0..ef8bb05fe 100644 --- a/README.md +++ b/README.md @@ -181,8 +181,8 @@ Release 4.4.0 of wolfSSL embedded TLS has bug fixes and new features including: * For fast math, use a constant time modular inverse when mapping to affine when operation involves a private key - keygen, calc shared secret, sign. - Thank you to the Network and Information Security Group (NISEC) at - Tampere University for the report. + Thank you to the Alejandro Cabrera Aldaya, Cesar Pereida García, and + Billy Bob Brumley from Tampere University for the report. * Change constant time and cache resistant ECC mulmod. Ensure points being operated on change to make constant time. Thank you to Pietro Borrello at