package bls12-381
https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-bls-signature-04#section-3.1
In a basic scheme, rogue key attacks are handled by requiring all messages signed by an aggregate signature to be distinct. This requirement is enforced in the definition of AggregateVerify.
The Sign and Verify functions are identical to CoreSign and CoreVerify (Section 2), respectively.
sectionYPositions = computeSectionYPositions($el), 10)"
x-init="setTimeout(() => sectionYPositions = computeSectionYPositions($el), 10)"
>