Releases: paulmillr/noble-ed25519
Releases · paulmillr/noble-ed25519
1.6.0
First audited version of the library. Audit has been completed by cure53. Check out the audit pdf in repo.
- Made
verify()
compliant with ZIP215, removed possible malleability from its s
check
- Added
Point#isTorsionFree()
- Added
RistrettoPoint
class instead of methods in ExtendedPoint, which have been removed
- Improved
ExtendedPoint
equality check
- Added
utils.hashToPrivateScalar
, utils.invert
- Disallow invalid
invZ
values in ExtendedPoint#toAffine
- Update deno version of sha512 dependency
- 10-15% speedup
1.5.3
- The library is now compatible with ZIP215:
verify()
rules were changed slightly
CURVE.l
now represents curve order instead of CURVE.n
- docs: Fix sign in definition of CURVE.n by @dsernst in #49
Full Changelog: 1.5.2...1.5.3
1.5.2
getSharedSecret()
got fixed: it is now commutative
Point#toX25519
now returns little-endian Uint8Array instead of bigint.
Full Changelog: 1.5.1...1.5.2
1.5.1
- Fixes an issue where node.js
Buffer
input was mutated. #45
- This happened because node.js buffer.slice() is mutable, while Uint8Array is immutable
1.5.0
- Added support for RFC7748 X25519
getSharedSecret
takes ed25519 keys
curve25519.scalarMult
and curve25519.scalarMultBase
work with curve25519 keys
New Contributors
Full Changelog: 1.4.0...1.5.0
1.4.0
- Important: removed
string
(hex) return type from public methods. Uint8Array
is now always returned
- Improve hex parsing security
- Remove legacy
SignResult
class that duplicated Signature
1.3.3
- Be friendly to bad ECMAScript parsers by not using bigint literals like 123n
1.3.2
- Fix ESM and Deno compatibility
1.3.1
- ECMAScript module (ESM) support
- Do not depend on
@types/dom
with typescript
- Hex parsing security improvements
- Disallow private scalars that are bigger than curve order in
Point#multiply