Open arcfide opened 9 years ago
This amounts to combining applying modular exponentiation to the hash value of a message. Ideally it should be implemented in such a way as to be independent of the hash function, but for an initial pass it suffices to implement it with SHA-2.
This amounts to combining applying modular exponentiation to the hash value of a message. Ideally it should be implemented in such a way as to be independent of the hash function, but for an initial pass it suffices to implement it with SHA-2.