Technology

What cryptographic functions are used?
AES-GCM using 256 bit keys 128 bit tags 96 bit IVs ECDSA using P-256 keys SHA-256 hashing Key Wrapping The protocol uses ECDH key agree...
Mon, 1 Nov, 2021 at 10:39 AM