I've removed the "expressed as elliptic curve operations" as I don't think it's relevant to the point being made. Even if it did require more EC operations, the security would not be affected as it's only a small constant term (not even a constant factor).
Ping @jonasnick.
I've removed the "expressed as elliptic curve operations" as I don't think it's relevant to the point being made. Even if it did require more EC operations, the security would not be affected as it's only a small constant term (not even a constant factor).
WDYT?