A bit string generated during digital signature generation using the RSA Signature Scheme with Appendix - Probabilistic Signature Scheme (RSASSA-PSS RSA).
Sources:
NIST SP 800-106
under Salt
from
PKCS#1 v2.1
A non-secret value used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker.
Sources:
NIST SP 800-63-3
under Salt
A non-secret value that is used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker.
Sources:
CNSSI 4009-2015
As used in this Recommendation, a byte string (which may be secret or non-secret) that is used as a MAC key.
Sources:
NIST SP 800-133 Rev. 2
under Salt
As used in this Recommendation, a byte string (which may be secret or non-secret) that is used as a MAC key by either: 1) a MAC-based auxiliary function H employed in one-step key derivation or 2) a MAC employed in the randomness-extraction step during two-step key derivation.
Sources:
NIST SP 800-56C Rev. 2
under Salt