Search results

Jump to navigation Jump to search
  • For each act besides the first, we generate enough bits of entropy for our symmetric encryption scheme, we will be using AES-256 and SHA-256 a ...5 acts, we will have 4 x 32-bytes entropy seeds per actor, let's call this entropy function Rnd(Actor, Act).
    4 KB (706 words) - 02:40, 26 September 2016