diff --git a/is-my-code-constant-time?.md b/is-my-code-constant-time?.md index 5078470..fdfed2a 100644 --- a/is-my-code-constant-time?.md +++ b/is-my-code-constant-time?.md @@ -11,6 +11,7 @@ Non-constant time crypto code is dangerous. 1. [crypto/internal/bigmod: add amd64 assembly core](https://github.com/golang/go/commit/335e7647f53293eb320c1f069eaf0ff641810d6d) 1. [The Marvin Attack](https://people.redhat.com/~hkario/marvin/) 1. [CVE-2023-45287 Detail](https://nvd.nist.gov/vuln/detail/CVE-2023-45287) +1. [Vulnerability Report: GO-2023-2375](https://pkg.go.dev/vuln/GO-2023-2375) ## ECDH & SM2 Key Exchange SM2 Key Exchange要去除big.Int依赖,看起来比ECDH困难得多,主要是第三、四和五步。