Copyright © 2014-2022, Andrew Bennett
Authors: Andrew Bennett (potatosaladx@gmail.com).
decode_point(X1) -> any()
dom2(PHFlag, C) -> any()
ed25519_sign(M, SK) -> any()
ed25519_verify(Sig, M, PK) -> any()
ed25519ctx_sign(M, SK, C) -> any()
ed25519ctx_verify(Sig, M, PK, C) -> any()
ed25519ph_sign(M, SK) -> any()
ed25519ph_sign(M, SK, C) -> any()
ed25519ph_verify(Sig, M, PK) -> any()
ed25519ph_verify(Sig, M, PK, C) -> any()
edwards_add(X1, X2) -> any()
edwards_double(P) -> any()
edwards_equal(X1, X2) -> any()
encode_point(X1) -> any()
keypair() -> any()
keypair(Secret) -> any()
normalize_point(X1) -> any()
pk_to_curve25519(X1) -> any()
scalarmult(P, E) -> any()
scalarmult_base(E) -> any()
secret() -> any()
secret_to_curve25519(Secret) -> any()
secret_to_pk(Secret) -> any()
sign_internal(M, X2, PHFlag, C) -> any()
sk_to_curve25519(X1) -> any()
sk_to_pk(X1) -> any()
sk_to_secret(X1) -> any()
verify_internal(Sig, M, PK, PHFlag, C) -> any()
xrecover(Y) -> any()
Generated by EDoc