Search results

Jump to navigation Jump to search
Result 1 of 1
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  • For each act besides the first, we generate enough bits of entropy for our symmetric encryption scheme, we will be using AES-256 and SHA-256 a ...5 acts, we will have 4 x 32-bytes entropy seeds per actor, let's call this entropy function Rnd(Actor, Act).
    4 KB (706 words) - 02:40, 26 September 2016