1 2 Reference implementations 3 ------------------------- 4 5 Computing cell hashes, slot root, and producing Merkle proofs for small 6 amount of fake data. 7