Search Options

Results per page
Sort
Preferred Languages
Advance

Results 151 - 152 of 152 for Mechanisms (0.22 sec)

  1. CREDITS

           manner specified by section 6 of the GNU GPL for conveying
           Corresponding Source.
    
           1) Use a suitable shared library mechanism for linking with the
           Library.  A suitable mechanism is one that (a) uses at run time
           a copy of the Library already present on the user's computer
           system, and (b) will operate properly with a modified version
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Mar 13 05:29:51 UTC 2025
    - 1.8M bytes
    - Viewed (0)
  2. lib/fips140/v1.0.0.zip

    ek.encryptionKey1024 b = b[EncapsulationKeySize:] if !bytes.Equal(dk.h[:], b[:32]) { return nil, errors.New("mlkem: inconsistent H(ek) in encoded bytes") } b = b[32:] copy(dk.z[:], b) // Generate a random d value for use in Bytes(). This is a safety mechanism // that avoids returning a broken key vs a random key if this function is // called in contravention of the TestingOnlyNewDecaps function // comment advising against it. drbg.Read(dk.d[:]) return dk, nil } // kemKeyGen1024 generates a decapsulation...
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Wed Jan 29 15:10:35 UTC 2025
    - 635K bytes
    - Viewed (0)
Back to top