diff --git a/is-my-code-constant-time?.md b/is-my-code-constant-time?.md index 3c1d48e..4c98358 100644 --- a/is-my-code-constant-time?.md +++ b/is-my-code-constant-time?.md @@ -7,6 +7,7 @@ Non-constant time crypto code is dangerous. 1. [cmd/compile: use devirtualization in escape analysis](https://github.com/golang/go/issues/33160) 1. [cmd/compile: inlining after devirtualization](https://github.com/golang/go/issues/52193) 1. [crypto/elliptic: automatically upgrade CurveParams for known curves and deprecate custom ones](https://github.com/golang/go/issues/34648) +1. [PLANNING GO 1.20 CRYPTOGRAPHY WORK](https://words.filippo.io/dispatches/go1-20/) ## ECDH & SM2 Key Exchange SM2 Key Exchange要去除big.Int依赖,看起来比ECDH困难得多,主要是第三、四和五步。