From 90b7357e4238fd0981edd7b10f236e9952c19159 Mon Sep 17 00:00:00 2001 From: Christopher Patton Date: Mon, 19 Aug 2024 18:36:38 -0700 Subject: [PATCH] SQUASH review --- draft-irtf-cfrg-vdaf.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/draft-irtf-cfrg-vdaf.md b/draft-irtf-cfrg-vdaf.md index 0651e780..28520e20 100644 --- a/draft-irtf-cfrg-vdaf.md +++ b/draft-irtf-cfrg-vdaf.md @@ -4951,9 +4951,9 @@ justification of this choice. > to the high level idea. The description of the IDPF-key generation algorithm makes use of auxiliary -functions `extend()`, `convert()`, and `encode_public_share()` defined in -{{idpf-bbcggi21-helper-functions}}. In the following, we let `Field2` denote the -field `GF(2)`. +functions `extend()` and `convert()` defined in +{{idpf-bbcggi21-helper-functions}}. In the following, we let `Field2` denote +the field `GF(2)`. ~~~ python def gen( @@ -5029,7 +5029,7 @@ def gen( > TODO Describe in prose how IDPF-key evaluation algorithm works. The description of the IDPF-evaluation algorithm makes use of auxiliary -functions `extend()`, `convert()`, and `decode_public_share()` defined in +functions `extend()` and `convert()` defined in {{idpf-bbcggi21-helper-functions}}. ~~~ python