The default implementation relies on ECB which isn't safe (see here for more info).
Switches to counter mode with a nonce of 128bits randomly sampled (relies on OsRng internally during encrypt_share() to match other methods in KeyGen, would probably be better to have rng passed as parameter, as suggested in #13, which can be done later on).
The default implementation relies on ECB which isn't safe (see here for more info). Switches to counter mode with a nonce of 128bits randomly sampled (relies on OsRng internally during encrypt_share() to match other methods in KeyGen, would probably be better to have rng passed as parameter, as suggested in #13, which can be done later on).