|author||Tobias Klauser <email@example.com>||2015-01-07 09:39:54 +0100|
|committer||Andreas Schneider <firstname.lastname@example.org>||2015-01-13 08:45:51 +0100|
doc: Fix a typo in email@example.com
Fix the typo 'stengths' -> 'strengths' and remove the trailing white space on the same line. Signed-off-by: Tobias Klauser <firstname.lastname@example.org> Reviewed-by: Andreas Schneider <email@example.com>
Diffstat (limited to 'doc')
1 files changed, 1 insertions, 1 deletions
diff --git firstname.lastname@example.org email@example.com
index baa2ca41..0317fe44 100644
@@ -22,7 +22,7 @@ claims to be able to eavesdrop. Having a secure replacement would make passive
attacks much harder if such a backdoor exists.
However an alternative exists in the form of Curve25519. This algorithm has been
-proposed in 2006 by DJB [Curve25519]. Its main stengths are its speed, its
+proposed in 2006 by DJB [Curve25519]. Its main strengths are its speed, its
constant-time run time (and resistance against side-channel attacks), and its
lack of nebulous hard-coded constants.