Next: , Previous: Protocols and Engines, Up: Table of Contents


4 Algorithms

The crypto backends support a variety of algorithms used in public key cryptography. The following sections list the identifiers used to denote such an algorithm.