{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":407125893,"defaultBranch":"main","name":"webcrypto-secure-curves","ownerLogin":"WICG","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2021-09-16T10:47:39.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/13145324?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1708361875.0","currentOid":""},"activityList":{"items":[{"before":"c2426e60182adb1f8ffe65e586c770ce09759e1a","after":"e4345b1f412892c763c925f71a6968d6a03bd202","ref":"refs/heads/gh-pages","pushedAt":"2024-02-19T16:58:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Require cofactorless (unbatched) verification equation (#25)\n\nSHA: 067671c3789884a75e4c0a7a169fb20652b952ea\nReason: push, by twiss\n\nCo-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Require cofactorless (unbatched) verification equation (#25)"}},{"before":"3f752f31942def4eef76089ae9409445cb917402","after":null,"ref":"refs/heads/require-unbatched-equation","pushedAt":"2024-02-19T16:57:55.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"}},{"before":"c9eaaac88f5b40cca450ade172eb9c05ecb81d28","after":"067671c3789884a75e4c0a7a169fb20652b952ea","ref":"refs/heads/main","pushedAt":"2024-02-19T16:57:52.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Require cofactorless (unbatched) verification equation (#25)\n\nMandate the use of the cofactorless (unbatched) verification equation in\r\nEd25519 and Ed448.\r\n\r\nThis is already the current behavior of OpenSSL, BoringSSL, and Apple's\r\nCryptoKit, among other implementations.\r\n\r\nAdditionally, since Web Crypto does not have an API for batch signature\r\nverification, there seems to be no reason to use the cofactored\r\n(batched) equation.\r\n\r\nBy mandating one of the two equations, we reduce the risk of\r\ninteroperability failures, as well as the risk of this\r\n(potential) difference being used to fingerprint implementations.","shortMessageHtmlLink":"Require cofactorless (unbatched) verification equation (#25)"}},{"before":"3dd7b7188ad1f8611add8e7bbf7c575f0c952ff6","after":"3f752f31942def4eef76089ae9409445cb917402","ref":"refs/heads/require-unbatched-equation","pushedAt":"2024-02-08T20:41:39.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Require cofactorless (unbatched) verification equation","shortMessageHtmlLink":"Require cofactorless (unbatched) verification equation"}},{"before":null,"after":"3dd7b7188ad1f8611add8e7bbf7c575f0c952ff6","ref":"refs/heads/require-unbatched-equation","pushedAt":"2024-02-08T20:23:51.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Require cofactorless (unbatched) verification equation","shortMessageHtmlLink":"Require cofactorless (unbatched) verification equation"}},{"before":"016415fb4b273e5ee89b4d254bc75dc2a1ec5d3e","after":"c2426e60182adb1f8ffe65e586c770ce09759e1a","ref":"refs/heads/gh-pages","pushedAt":"2023-08-30T11:32:08.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Remove JWK \"alg\" field (#24)\n\nSHA: c9eaaac88f5b40cca450ade172eb9c05ecb81d28\nReason: push, by twiss\n\nCo-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Remove JWK \"alg\" field (#24)"}},{"before":"07a7b38c42787719ebf8fe7a223722a9b687f61c","after":null,"ref":"refs/heads/remove-jwk-alg","pushedAt":"2023-08-30T11:30:56.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"}},{"before":"36c0f23f73926454844fc4708e92a5b6044954fd","after":"c9eaaac88f5b40cca450ade172eb9c05ecb81d28","ref":"refs/heads/main","pushedAt":"2023-08-30T11:30:53.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Remove JWK \"alg\" field (#24)\n\nThe `alg` field is not required and might change in the future, see\r\nhttps://www.ietf.org/archive/id/draft-jones-jose-fully-specified-algorithms-00.html.\r\n\r\n* Revert \"Set and check \"alg\" JWK property for EdDSA keys (#3)\"\r\n\r\nThis reverts commit bf5f16119848c922cf4bf40aeb28c192d7ee4e1a.\r\n\r\n* Revert \"Update JWK mappings for Ed25519 and Ed448 (#4)\"\r\n\r\nThis reverts commit 5d58d4945c68302e0cd0e8b44d39345faf09ca76.","shortMessageHtmlLink":"Remove JWK \"alg\" field (#24)"}},{"before":null,"after":"07a7b38c42787719ebf8fe7a223722a9b687f61c","ref":"refs/heads/remove-jwk-alg","pushedAt":"2023-08-30T11:02:00.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Revert \"Update JWK mappings for Ed25519 and Ed448 (#4)\"\n\nThis reverts commit 5d58d4945c68302e0cd0e8b44d39345faf09ca76.","shortMessageHtmlLink":"Revert \"Update JWK mappings for Ed25519 and Ed448 (#4)\""}},{"before":"719e9ddbb88c957c968bdefe1585b961b28571c2","after":"016415fb4b273e5ee89b4d254bc75dc2a1ec5d3e","ref":"refs/heads/gh-pages","pushedAt":"2023-06-21T17:32:36.803Z","pushType":"push","commitsCount":1,"pusher":{"login":"github-actions[bot]","name":null,"path":"/apps/github-actions","primaryAvatarUrl":"https://avatars.githubusercontent.com/in/15368?s=80&v=4"},"commit":{"message":"Consider signatures with invalid or small-order elements invalid (#21)\n\nSHA: 36c0f23f73926454844fc4708e92a5b6044954fd\nReason: push, by twiss\n\nCo-authored-by: github-actions[bot] <41898282+github-actions[bot]@users.noreply.github.com>","shortMessageHtmlLink":"Consider signatures with invalid or small-order elements invalid (#21)"}},{"before":"d4c025235078a367047401ecd47c2ebdf35de49a","after":null,"ref":"refs/heads/eddsa-reject-small-order-points","pushedAt":"2023-06-21T17:31:42.490Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"}},{"before":"0874265053dcace299f52c1c9e6b1f2e925e0aa2","after":"36c0f23f73926454844fc4708e92a5b6044954fd","ref":"refs/heads/main","pushedAt":"2023-06-21T17:31:38.537Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Consider signatures with invalid or small-order elements invalid (#21)\n\nWhen verifying an Ed25519 or Ed448 signature, if the public key or the\r\nfirst half of the signature (`R`) is an invalid or small-order element,\r\nreturn `false`.","shortMessageHtmlLink":"Consider signatures with invalid or small-order elements invalid (#21)"}},{"before":"83a62ca0882256df029f843f77ffa28285b3112e","after":"d4c025235078a367047401ecd47c2ebdf35de49a","ref":"refs/heads/eddsa-reject-small-order-points","pushedAt":"2023-06-21T08:43:40.007Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Consider signatures with invalid or small-order elements invalid\n\nWhen verifying an Ed25519 or Ed448 signature, if the public key or the\nfirst half of the signature (`R`) is an invalid or small-order element,\nreturn false.","shortMessageHtmlLink":"Consider signatures with invalid or small-order elements invalid"}},{"before":"96fd46d19acbe8509801075e595f4e782f497ec7","after":null,"ref":"refs/heads/reject-invalid-points","pushedAt":"2023-06-20T16:23:35.280Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"}},{"before":"090e05a80a92cfee76e96181114d955fb4041d1b","after":null,"ref":"refs/heads/reject-small-order-on-import","pushedAt":"2023-06-20T16:23:14.100Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"}},{"before":"eeb734454820052032e5595a6680f38565754b86","after":"83a62ca0882256df029f843f77ffa28285b3112e","ref":"refs/heads/eddsa-reject-small-order-points","pushedAt":"2023-06-20T16:19:34.037Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Reject invalid and small-order elements on signature verification","shortMessageHtmlLink":"Reject invalid and small-order elements on signature verification"}},{"before":null,"after":"eeb734454820052032e5595a6680f38565754b86","ref":"refs/heads/eddsa-reject-small-order-points","pushedAt":"2023-06-20T16:08:14.949Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"twiss","name":"Daniel Huigens","path":"/twiss","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/908303?s=80&v=4"},"commit":{"message":"Reject invalid and small-order elements on signature verification","shortMessageHtmlLink":"Reject invalid and small-order elements on signature verification"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAD_t-KvgA","startCursor":null,"endCursor":null}},"title":"Activity ยท WICG/webcrypto-secure-curves"}