The associated data string.
Sources:
NIST SP 800-38C
The additional authenticated data
Sources:
NIST SP 800-38D
Additional input that is bound to the secret keying material; a byte string.
Sources:
NIST SP 800-56B Rev. 2
A short, alphanumeric string derived from a user’s public key using a hash function, with additional data to detect errors. Addresses are used to send and receive digital assets.
Sources:
NISTIR 8202
under Address
NISTIR 8301
under Address
from
NISTIR 8202