Closed jtobin closed 5 years ago
(Resolves #55)
A single application of SHA256 in this setting can be subject to length-extension attacks; a double application eliminates this possibility.
(Resolves #55)
A single application of SHA256 in this setting can be subject to length-extension attacks; a double application eliminates this possibility.