Cryptographic function: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (2 intermediate revisions by the same user not shown) | |||
(No difference)
| |||
Latest revision as of 00:24, 20 January 2026
Cryptographic function
Cryptographic algorithms, together with modes of operation (if appropriate); for example, block ciphers, digital signature algorithms, asymmetric key-establishment algorithms, message authentication codes, hash functions, or random bit generators.
Source: NIST SP 800-57 Part 2 Rev.1 | Category: