File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -34,10 +34,10 @@ const RAND_SIZE: usize = 1 << RAND_SIZE_LEN;
3434/// non-cryptographic applications.
3535///
3636/// In spite of being designed with cryptographic security in mind, ISAAC hasn't
37- /// been stringently cryptanalyzed and thus cryptographers do not not
37+ /// been stringently cryptanalyzed and thus cryptographers do not
3838/// consensually trust it to be secure. When looking for a secure RNG, prefer
3939/// `Hc128Rng` from the [`rand_hc`] crate instead, which, like ISAAC, is an
40- /// array-based RNG and one of the stream-ciphers selected the by eSTREAM
40+ /// array-based RNG and one of the stream-ciphers selected by eSTREAM
4141///
4242/// In 2006 an improvement to ISAAC was suggested by Jean-Philippe Aumasson,
4343/// named ISAAC+[^3]. But because the specification is not complete, because
Original file line number Diff line number Diff line change @@ -40,10 +40,10 @@ const RAND_SIZE: usize = 1 << RAND_SIZE_LEN;
4040/// non-cryptographic applications.
4141///
4242/// In spite of being designed with cryptographic security in mind, ISAAC hasn't
43- /// been stringently cryptanalyzed and thus cryptographers do not not
43+ /// been stringently cryptanalyzed and thus cryptographers do not
4444/// consensually trust it to be secure. When looking for a secure RNG, prefer
4545/// `Hc128Rng` from the [`rand_hc`] crate instead, which, like ISAAC, is an
46- /// array-based RNG and one of the stream-ciphers selected the by eSTREAM
46+ /// array-based RNG and one of the stream-ciphers selected by eSTREAM
4747///
4848/// ## Overview of the ISAAC-64 algorithm:
4949/// (in pseudo-code)
You can’t perform that action at this time.
0 commit comments