Search results
Jump to navigation
Jump to search
- For each act besides the first, we generate enough bits of entropy for our symmetric encryption scheme, we will be using AES-256 and SHA-256 a ...5 acts, we will have 4 x 32-bytes entropy seeds per actor, let's call this entropy function Rnd(Actor, Act).4 KB (706 words) - 02:40, 26 September 2016