Secure Random
Secure Random
Securely generate random data
Encryption
Encryption
Encrypt and decrypt data with a single private key
Signatures
Signatures
Sign data with a private key, and verify it with a public key
MACs
MACs
Verify authenticity and integrity of data
Hashing
Hashing
Popular one-way hash algorithms