- Sort Score
- Num 10 results
- Language All
Results 171 - 173 of 173 for Mechanisms (0.15 seconds)
-
CREDITS
manner specified by section 6 of the GNU GPL for conveying Corresponding Source. 1) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (a) uses at run time a copy of the Library already present on the user's computer system, and (b) will operate properly with a modified versionCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Thu Mar 13 05:29:51 GMT 2025 - 1.8M bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
ek.encryptionKey1024 b = b[EncapsulationKeySize:] if !bytes.Equal(dk.h[:], b[:32]) { return nil, errors.New("mlkem: inconsistent H(ek) in encoded bytes") } b = b[32:] copy(dk.z[:], b) // Generate a random d value for use in Bytes(). This is a safety mechanism // that avoids returning a broken key vs a random key if this function is // called in contravention of the TestingOnlyNewDecaps function // comment advising against it. drbg.Read(dk.d[:]) return dk, nil } // kemKeyGen1024 generates a decapsulation...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.26.0.zip
ek.encryptionKey1024 b = b[EncapsulationKeySize:] if !bytes.Equal(dk.h[:], b[:32]) { return nil, errors.New("mlkem: inconsistent H(ek) in encoded bytes") } b = b[32:] copy(dk.z[:], b) // Generate a random d value for use in Bytes(). This is a safety mechanism // that avoids returning a broken key vs a random key if this function is // called in contravention of the TestingOnlyNewDecaps function // comment advising against it. drbg.Read(dk.d[:]) return dk, nil } // kemKeyGen1024 generates a decapsulation...
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Thu Jan 08 17:58:32 GMT 2026 - 660.3K bytes - Click Count (0)