summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--doc/cha-cert-auth.texi4
-rw-r--r--doc/signatures.texi4
2 files changed, 4 insertions, 4 deletions
diff --git a/doc/cha-cert-auth.texi b/doc/cha-cert-auth.texi
index 19f4b9ef2e..2065badd87 100644
--- a/doc/cha-cert-auth.texi
+++ b/doc/cha-cert-auth.texi
@@ -578,8 +578,8 @@ used to preprocess the input to the signature algorithm. This works as
long as it is difficult enough to generate two different messages with
the same hash algorithm output. In that case the same signature could
be used as a proof for both messages. Nobody wants to sign an innocent
-message of donating 1 @euro{} to Greenpeace and find out that he
-donated 1.000.000 @euro{} to Bad Inc.
+message of donating 1 euro to Greenpeace and find out that he
+donated 1.000.000 euros to Bad Inc.
For a hash algorithm to be called cryptographic the following three
requirements must hold:
diff --git a/doc/signatures.texi b/doc/signatures.texi
index 32e1013155..1b7c667863 100644
--- a/doc/signatures.texi
+++ b/doc/signatures.texi
@@ -11,8 +11,8 @@ used to preprocess the input to the signature algorithm. This works as
long as it is difficult enough to generate two different messages with
the same hash algorithm output. In that case the same signature could
be used as a proof for both messages. Nobody wants to sign an innocent
-message of donating 1 @euro{} to Greenpeace and find out that he
-donated 1.000.000 @euro{} to Bad Inc.
+message of donating 1 euro to Greenpeace and find out that he
+donated 1.000.000 euros to Bad Inc.
For a hash algorithm to be called cryptographic the following three
requirements must hold