Closed
Bug 329774
Opened 18 years ago
Closed 1 year ago
Implement optimized base point multiplication for NIST Suite B elliptic curves
Categories
(NSS :: Libraries, defect, P3)
Tracking
(Not tracked)
RESOLVED
WONTFIX
People
(Reporter: douglas, Unassigned)
Details
ECDSA signing (used by the server in SSL handshakes) can be sped up by optimizing the base point multiplication algorithms. These can be optimized by precomputing and storing in the code before compile-time small multiples of the base point instead of needing to compute these multiples each point multiplication.
Updated•18 years ago
|
Assignee: wtchang → douglas
Reporter | ||
Comment 1•18 years ago
|
||
Bob, are these improvements still necessary after your improvements in bug #321350, or does that give sufficient performance?
Updated•18 years ago
|
QA Contact: jason.m.reid → libraries
Comment 2•18 years ago
|
||
This may become higher priority over time, but not today. Of course, if a patch becomes available soon, it will be considered pretty quickly.
Priority: -- → P3
Version: unspecified → 3.11
Updated•2 years ago
|
Severity: normal → S3
Comment 3•1 year ago
|
||
The bug assignee is inactive on Bugzilla, so the assignee is being reset.
Assignee: douglas → nobody
Updated•1 year ago
|
Status: NEW → RESOLVED
Closed: 1 year ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•