Lines Matching full:an
8 The TinyCrypt Library provides an implementation for targeting constrained devices
126 2^64 bits, which is an extremely large window.
145 * Before using HMAC-PRNG, you *must* find an entropy source to produce a seed.
170 * Before using CTR-PRNG, you *must* find an entropy source to produce a seed.
184 attacks. Note however that an external attacker cannot generate the tags
186 collision property of AES128-CMAC, an external attacker would need the
187 cooperation of the legal user to produce an exponentially high number of
189 from them. As an extra precaution, the current implementation allows to at
211 The mac size parameter is an important parameter to estimate the security
227 * Non-empty associated data and empty payload (it degenerates to an
240 documentation, there is an important remark about the way integers are
251 consisting of 4 unsigned integers (as an example).
276 * Create an authenticated, replay-protected session (HMAC-SHA256 + HMAC-PRNG);
292 For the case of the HMAC-PRNG, due to the necessity of performing an extensive