The SCrypt type exposes the following members.
Back to Top
Computes a derived key.
The SCrypt algorithm creates a salt which it then uses as a one-iteration PBKDF2 key stream with SHA256 HMAC. This method lets you retrieve this intermediate salt.
Creates a derived key stream from which a derived key can be read.