Open
Description
We should re-examine what we hash into a given branch/leaf to bubble up into the tree.
See section 5 of this paper: https://eprint.iacr.org/2016/683
If we deem that the specified attacks apply, then we may also start to encode information such as the depth or index of the leaf. It may also turn out that our sum usage its enough.