Key wrapping algorithm: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
| (2 intermediate revisions by the same user not shown) | |
(No difference)
| |
A cryptographic algorithm approved for use in wrapping keys.
Source: NIST SP 800-57 Part 2 Rev.1 | Category: