Copyright | (c) 2024 Auth Global |
---|---|
License | Apache2 |
Safe Haskell | Safe-Inferred |
Language | Haskell2010 |
See NIST Special Publication 800-185: SHA-3 Derived Functions: cSHAKE, KMAC, TupleHash and ParallelHash. https://www.nist.gov/publications/sha-3-derived-functions-cshake-kmac-tuplehash-and-parallelhash Note that this module does not implement TupleHash itself, though it could be used to implement TupleHash given an implementation of Keccak/SHA-3. This only implements the data-encoding portions of TupleHash, and does not implement any kind of cryptographic state machine.
Documentation
leftEncode :: forall b. (Integral b, FiniteBits b) => b -> ByteString Source #
leftEncodeFromBytes :: (Integral b, FiniteBits b) => b -> ByteString Source #
encodeString :: ByteString -> ByteString Source #
encodedByteLength :: ByteString -> Int Source #
encodedVectorByteLength :: Foldable f => f ByteString -> Int Source #
bareEncode :: (Integral b, FiniteBits b) => b -> ByteString Source #
bareEncodeFromBytes :: (Integral b, FiniteBits b) => b -> ByteString Source #
lengthOfBareEncode :: (Integral b, FiniteBits b) => b -> Int Source #
lengthOfBareEncodeFromBytes :: (Integral b, FiniteBits b) => b -> Int Source #
lengthOfLeftEncode :: (Integral b, FiniteBits b) => b -> Int Source #
lengthOfLeftEncodeFromBytes :: (Integral b, FiniteBits b) => b -> Int Source #