1. 9

h/t @nickpsecurity for the fantastic find. From “The Design and Verification of a Cryptographic Security Architecture”, found here.

  1.