The procedure whereby the recipient of a public key checks that the key conforms to the arithmetic requirements for such a key in order to thwart certain types of attacks. Source(s): NIST SP 800-56B Rev. 2 NIST SP 800-56B Rev. 1 [Superseded]
Comments about specific definitions should be sent to the authors of the linked Source publication. For NIST publications, an email is usually found within the document.
Comments about the glossary's presentation and functionality should be sent to email@example.com.