Home | History | Annotate | Download | only in libtomcrypt

Lines Matching refs:easily

4795 hash functions output.  As such, it can easily be used to derive session keys for ciphers and MACs as well initial vectors as required
4947 having to hack the library. For example, suppose you have a hardware specific PRNG on your system. You could easily