We expect to potentially use two hash functions in the domain separator:
- Keccak in duplex overwrite mode
- Keccak in duplex mode
since there exists a reduction from one to the other, it is important when considering multi-protocol security that these two lead to different IVs.