5. Cryptographic Primitives
Hash functions, signature schemes, and VRF operations used by JAM (GP §3.8, Appendix E).
All primitives are declared opaque — their correctness is axiomatic.
Hash functions, signature schemes, and VRF operations used by JAM (GP §3.8, Appendix E).
All primitives are declared opaque — their correctness is axiomatic.