| http://www.w3.org/ns/prov#value | - I like to have projects in constantly changing companies and areas.You can use library implementations of a cipher, with library methods for handling padding and initialisation vectors, etc, and still be vulnerable e.g. predictable initialisation vectors, block swapping and padding oracle attacks.
|