Implements cryptographic signatures using the nist p256 curve.
The name of this signing algorithm.
Generate a public key from a secret key.
Generate a new random secret key.
Sign some data with a secret key.
Verify a signature against the data that was signed.
Implements cryptographic signatures using the nist p256 curve.