The corollary to this is that digital signature implantations tend not to be timing hardened, with the assumption that signed-over inputs are not secret. If your scheme assumes that signed-over inputs also need to remain secret, you’re likely misusing your digital signature primitive!