The associated data string.
Sources:
NIST SP 800-38C
under A
The additional authenticated data
Sources:
NIST SP 800-38D
under A
Additional input that is bound to the secret keying material; a byte string.
Sources:
NIST SP 800-56B Rev. 2
under A
A short, alphanumeric string derived from a user’s public key using a hash function, with additional data to detect errors. Addresses are used to send and receive digital assets.
Sources:
NISTIR 8202
NISTIR 8301
from
NISTIR 8202