We expect to potentially use two hash functions in the domain separator: - Keccak in duplex overwrite mode - Keccak in duplex mode since there exists a reduction from one to the other, it is important when considering multi-protocol security that these two lead to different IVs.