A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
A well-defined computational procedure that takes variable inputs, including a cryptographic key, and produces an output.
An algorithm that uses the science of cryptography, including (a) encryption algorithms, (b) cryptographic hash algorithms, (c) digital signature algorithms, and (d) key-agreement algorithms.