JAR: JAM Axiomatic Reference

5. Cryptographic Primitives🔗

Hash functions, signature schemes, and VRF operations used by JAM (GP §3.8, Appendix E). All primitives are declared opaque — their correctness is axiomatic.

  1. 5.1. Hash Functions
  2. 5.2. Ed25519
  3. 5.3. Bandersnatch
  4. 5.4. Bandersnatch Ring VRF
  5. 5.5. BLS12-381
  6. 5.6. Contexts
  7. 5.7. Utility