# Functions
No description provided by the author
the given data must not be controlled by an adversary, it must be a hash over given data.
No description provided by the author
# Constants
with recovery, without recovery we can skip the last byte.