The process of using a digital signature algorithm and a public key to verify a digital signature on data.
Sources:
FIPS 186-5
NIST SP 800-102
NIST SP 800-89
The process of using a digital signature algorithm and a public key to verify a digital signature on data.
Sources:
FIPS 204
under signature verification
FIPS 205
under signature verification
from
FIPS 186-5
The use of a digital signature algorithm and a public key to verify a digital signature on data.
Sources:
NIST SP 800-57 Part 1 Rev. 5
The use of a digital signature and a public key to verify a digital signature on data.
Sources:
NIST SP 800-175B Rev. 1