How Can We Help?
Uses a digital signature algorithm and a private key to generate a digital signature on data.
SOURCE: SP 800-57 Part 1
The process of using a digital signature algorithm and a private key to generate a digital signature on data.
SOURCE: FIPS 186