1.
Introduction
2.
Format
2.1.
Entry Name
2.2.
MLA Key File
3.
Cryptography
3.1.
Key Derivation
4.
Fuzzing