Name,Value,Description,Capabilities,Change Controller,Reference,Recommended
Reserved for Private Use,less than -65536,,,,[RFC9053],No
Unassigned,-65536,,,,,
RS1,-65535,RSASSA-PKCS1-v1_5 using SHA-1,[kty],IESG,[RFC8812][RFC9053],Deprecated
A128CTR,-65534,AES-CTR w/ 128-bit key,[kty],IETF,[RFC9459],Deprecated
A192CTR,-65533,AES-CTR w/ 192-bit key,[kty],IETF,[RFC9459],Deprecated
A256CTR,-65532,AES-CTR w/ 256-bit key,[kty],IETF,[RFC9459],Deprecated
A128CBC,-65531,AES-CBC w/ 128-bit key,[kty],IETF,[RFC9459],Deprecated
A192CBC,-65530,AES-CBC w/ 192-bit key,[kty],IETF,[RFC9459],Deprecated
A256CBC,-65529,AES-CBC w/ 256-bit key,[kty],IETF,[RFC9459],Deprecated
Unassigned,-65528 to -269,,,,,
ESB512,-268,ECDSA using BrainpoolP512r1 curve and SHA-512,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],No
ESB384,-267,ECDSA using BrainpoolP384r1 curve and SHA-384,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],No
ESB320,-266,ECDSA using BrainpoolP320r1 curve and SHA-384,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],No
ESB256,-265,ECDSA using BrainpoolP256r1 curve and SHA-256,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],No
KT256,-264,KT256 XOF,[kty],IETF,[RFC-irtf-cfrg-kangarootwelve-17],No
KT128,-263,KT128 XOF,[kty],IETF,[RFC-irtf-cfrg-kangarootwelve-17],No
TurboSHAKE256,-262,TurboSHAKE256 XOF,[kty],IETF,[RFC-irtf-cfrg-kangarootwelve-17],No
TurboSHAKE128,-261,TurboSHAKE128 XOF,[kty],IETF,[RFC-irtf-cfrg-kangarootwelve-17],No
WalnutDSA,-260,WalnutDSA signature,[kty],,[RFC9021][RFC9053],No
RS512,-259,RSASSA-PKCS1-v1_5 using SHA-512,[kty],IESG,[RFC8812][RFC9053],No
RS384,-258,RSASSA-PKCS1-v1_5 using SHA-384,[kty],IESG,[RFC8812][RFC9053],No
RS256,-257,RSASSA-PKCS1-v1_5 using SHA-256,[kty],IESG,[RFC8812][RFC9053],No
Unassigned,-256 to -54,,,,,
Ed448,-53,EdDSA using Ed448 curve,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],Yes
ESP512,-52,ECDSA using P-521 curve and SHA-512,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],Yes
ESP384,-51,ECDSA using P-384 curve and SHA-384,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],Yes
ML-DSA-87,-50,"CBOR Object Signing Algorithm for ML-DSA-87 (TEMPORARY - registered 2025-04-24, expires 2026-04-24)",[kty],,[draft-ietf-cose-dilithium-06],Yes
ML-DSA-65,-49,"CBOR Object Signing Algorithm for ML-DSA-65 (TEMPORARY - registered 2025-04-24, expires 2026-04-24)",[kty],,[draft-ietf-cose-dilithium-06],Yes
ML-DSA-44,-48,"CBOR Object Signing Algorithm for ML-DSA-44 (TEMPORARY - registered 2025-04-24, expires 2026-04-24)",[kty],,[draft-ietf-cose-dilithium-06],Yes
ES256K,-47,ECDSA using secp256k1 curve and SHA-256,[kty],IESG,[RFC8812][RFC9053],No
HSS-LMS,-46,HSS/LMS hash-based digital signature,[kty],,[RFC8778][RFC9053],Yes
SHAKE256,-45,SHAKE-256 512-bit Hash Value,[kty],,[RFC9054][RFC9053],Yes
SHA-512,-44,SHA-2 512-bit Hash,[kty],,[RFC9054][RFC9053],Yes
SHA-384,-43,SHA-2 384-bit Hash,[kty],,[RFC9054][RFC9053],Yes
RSAES-OAEP w/ SHA-512,-42,RSAES-OAEP w/ SHA-512,[kty],,[RFC8230][RFC9053],Yes
RSAES-OAEP w/ SHA-256,-41,RSAES-OAEP w/ SHA-256,[kty],,[RFC8230][RFC9053],Yes
RSAES-OAEP w/ RFC 8017 default parameters,-40,RSAES-OAEP w/ SHA-1,[kty],,[RFC8230][RFC9053],Yes
PS512,-39,RSASSA-PSS w/ SHA-512,[kty],,[RFC8230][RFC9053],Yes
PS384,-38,RSASSA-PSS w/ SHA-384,[kty],,[RFC8230][RFC9053],Yes
PS256,-37,RSASSA-PSS w/ SHA-256,[kty],,[RFC8230][RFC9053],Yes
ES512,-36,ECDSA w/ SHA-512,[kty],,[RFC9053][RFC-ietf-jose-fully-specified-algorithms-13],Deprecated
ES384,-35,ECDSA w/ SHA-384,[kty],IETF,[RFC9053][RFC-ietf-jose-fully-specified-algorithms-13],Deprecated
ECDH-SS + A256KW,-34,ECDH SS w/ Concat KDF and AES Key Wrap w/ 256-bit key,[kty],,[RFC9053],Yes
ECDH-SS + A192KW,-33,ECDH SS w/ Concat KDF and AES Key Wrap w/ 192-bit key,[kty],,[RFC9053],Yes
ECDH-SS + A128KW,-32,ECDH SS w/ Concat KDF and AES Key Wrap w/ 128-bit key,[kty],,[RFC9053],Yes
ECDH-ES + A256KW,-31,ECDH ES w/ Concat KDF and AES Key Wrap w/ 256-bit key,[kty],,[RFC9053],Yes
ECDH-ES + A192KW,-30,ECDH ES w/ Concat KDF and AES Key Wrap w/ 192-bit key,[kty],,[RFC9053],Yes
ECDH-ES + A128KW,-29,ECDH ES w/ Concat KDF and AES Key Wrap w/ 128-bit key,[kty],,[RFC9053],Yes
ECDH-SS + HKDF-512,-28,ECDH SS w/ HKDF - generate key directly,[kty],,[RFC9053],Yes
ECDH-SS + HKDF-256,-27,ECDH SS w/ HKDF - generate key directly,[kty],,[RFC9053],Yes
ECDH-ES + HKDF-512,-26,ECDH ES w/ HKDF - generate key directly,[kty],,[RFC9053],Yes
ECDH-ES + HKDF-256,-25,ECDH ES w/ HKDF - generate key directly,[kty],,[RFC9053],Yes
Unassigned,-24 to -20,,,,,
Ed25519,-19,EdDSA using Ed25519 curve,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],Yes
SHAKE128,-18,SHAKE-128 256-bit Hash Value,[kty],,[RFC9054][RFC9053],Yes
SHA-512/256,-17,SHA-2 512-bit Hash truncated to 256-bits,[kty],,[RFC9054][RFC9053],Yes
SHA-256,-16,SHA-2 256-bit Hash,[kty],,[RFC9054][RFC9053],Yes
SHA-256/64,-15,SHA-2 256-bit Hash truncated to 64-bits,[kty],,[RFC9054][RFC9053],Filter Only
SHA-1,-14,SHA-1 Hash,[kty],,[RFC9054][RFC9053],Filter Only
direct+HKDF-AES-256,-13,Shared secret w/ AES-MAC 256-bit key,[kty],,[RFC9053],Yes
direct+HKDF-AES-128,-12,Shared secret w/ AES-MAC 128-bit key,[kty],,[RFC9053],Yes
direct+HKDF-SHA-512,-11,Shared secret w/ HKDF and SHA-512,[kty],,[RFC9053],Yes
direct+HKDF-SHA-256,-10,Shared secret w/ HKDF and SHA-256,[kty],,[RFC9053],Yes
ESP256,-9,ECDSA using P-256 curve and SHA-256,[kty],IETF,[RFC-ietf-jose-fully-specified-algorithms-13],Yes
EdDSA,-8,EdDSA,[kty],IETF,[RFC9053][RFC-ietf-jose-fully-specified-algorithms-13],Deprecated
ES256,-7,ECDSA w/ SHA-256,[kty],IETF,[RFC9053][RFC-ietf-jose-fully-specified-algorithms-13],Deprecated
direct,-6,Direct use of CEK,[kty],,[RFC9053],Yes
A256KW,-5,AES Key Wrap w/ 256-bit key,[kty],,[RFC9053],Yes
A192KW,-4,AES Key Wrap w/ 192-bit key,[kty],,[RFC9053],Yes
A128KW,-3,AES Key Wrap w/ 128-bit key,[kty],,[RFC9053],Yes
Unassigned,-2 to -1,,,,,
Reserved,0,,,,[RFC9053],No
A128GCM,1,"AES-GCM mode w/ 128-bit key, 128-bit tag",[kty],,[RFC9053],Yes
A192GCM,2,"AES-GCM mode w/ 192-bit key, 128-bit tag",[kty],,[RFC9053],Yes
A256GCM,3,"AES-GCM mode w/ 256-bit key, 128-bit tag",[kty],,[RFC9053],Yes
HMAC 256/64,4,HMAC w/ SHA-256 truncated to 64 bits,[kty],,[RFC9053],Yes
HMAC 256/256,5,HMAC w/ SHA-256,[kty],,[RFC9053],Yes
HMAC 384/384,6,HMAC w/ SHA-384,[kty],,[RFC9053],Yes
HMAC 512/512,7,HMAC w/ SHA-512,[kty],,[RFC9053],Yes
Unassigned,8-9,,,,,
AES-CCM-16-64-128,10,"AES-CCM mode 128-bit key, 64-bit tag, 13-byte nonce",[kty],,[RFC9053],Yes
AES-CCM-16-64-256,11,"AES-CCM mode 256-bit key, 64-bit tag, 13-byte nonce",[kty],,[RFC9053],Yes
AES-CCM-64-64-128,12,"AES-CCM mode 128-bit key, 64-bit tag, 7-byte nonce",[kty],,[RFC9053],Yes
AES-CCM-64-64-256,13,"AES-CCM mode 256-bit key, 64-bit tag, 7-byte nonce",[kty],,[RFC9053],Yes
AES-MAC 128/64,14,"AES-MAC 128-bit key, 64-bit tag",[kty],,[RFC9053],Yes
AES-MAC 256/64,15,"AES-MAC 256-bit key, 64-bit tag",[kty],,[RFC9053],Yes
Unassigned,16-23,,,,,
ChaCha20/Poly1305,24,"ChaCha20/Poly1305 w/ 256-bit key, 128-bit tag",[kty],,[RFC9053],Yes
AES-MAC 128/128,25,"AES-MAC 128-bit key, 128-bit tag",[kty],,[RFC9053],Yes
AES-MAC 256/128,26,"AES-MAC 256-bit key, 128-bit tag",[kty],,[RFC9053],Yes
Unassigned,27-29,,,,,
AES-CCM-16-128-128,30,"AES-CCM mode 128-bit key, 128-bit tag, 13-byte nonce",[kty],,[RFC9053],Yes
AES-CCM-16-128-256,31,"AES-CCM mode 256-bit key, 128-bit tag, 13-byte nonce",[kty],,[RFC9053],Yes
AES-CCM-64-128-128,32,"AES-CCM mode 128-bit key, 128-bit tag, 7-byte nonce",[kty],,[RFC9053],Yes
AES-CCM-64-128-256,33,"AES-CCM mode 256-bit key, 128-bit tag, 7-byte nonce",[kty],,[RFC9053],Yes
IV-GENERATION,34,For doing IV generation for symmetric algorithms.,,,[RFC9053],No
Presently we were in a very dark road, and at a point where it dropped suddenly between steep sides we halted in black shadow. A gleam of pale sand, a whisper of deep flowing waters, and a farther glimmer of more sands beyond them challenged our advance. We had come to a "grapevine ferry." The scow was on the other side, the water too shoal for the horses to swim, and the bottom, most likely, quicksand. Out of the blackness of the opposite shore came a soft, high-pitched, quavering, long-drawn, smothered moan of woe, the call of that snivelling little sinner the screech-owl. Ferry murmured to me to answer it and I sent the same faint horror-stricken tremolo back. Again it came to us, from not farther than one might toss his cap, and I followed Ferry down to the water's edge. The grapevine guy swayed at our side, we heard the scow slide from the sands, and in a few moments, moved by two videttes, it touched our shore. Soon we were across, the two videttes riding with us, and beyond a sharp rise, in an old opening made by the swoop of a hurricane, we entered the silent unlighted bivouac of Ferry's scouts. Ferry got down and sat on the earth talking with Quinn, while the sergeants quietly roused the sleepers to horse. Plotinus is driven by this perplexity to reconsider the whole theory of Matter.477 He takes Aristotle¡¯s doctrine as the groundwork of his investigation. According to this, all existence is divided into Matter and Form. What we know of things¡ªin other words, the sum of their differential characteristics¡ªis their Form. Take away this, and the unknowable residuum is their Matter. Again, Matter is the vague indeterminate something out of which particular Forms are developed. The two are related as Possibility to Actuality, as the more generic to the more specific substance through every grade of classification and composition. Thus there are two Matters, the one sensible and the other intelligible. The former constitutes the common substratum of bodies, the other the common element of ideas.478 The general distinction between Matter and Form was originally suggested to Aristotle by Plato¡¯s remarks on the same subject; but he differs325 from his master in two important particulars. Plato, in his Timaeus, seems to identify Matter with space.479 So far, it is a much more positive conception than the ?λη of the Metaphysics. On the other hand, he constantly opposes it to reality as something non-existent; and he at least implies that it is opposed to absolute good as a principle of absolute evil.480 Thus while the Aristotelian world is formed by the development of Power into Actuality, the Platonic world is composed by the union of Being and not-Being, of the Same and the Different, of the One and the Many, of the Limit and the Unlimited, of Good and Evil, in varying proportions with each other. The Lawton woman had heard of an officer's family at Grant, which was in need of a cook, and had gone there. [See larger version] On the 8th of July an extraordinary Privy Council was summoned. All the members, of whatever party, were desired to attend, and many were the speculations as to the object of their meeting. The general notion was that it involved the continuing or the ending of the war. It turned out to be for the announcement of the king's intended marriage. The lady selected was Charlotte, the second sister of the Duke of Mecklenburg-Strelitz. Apart from the narrowness of her education, the young princess had a considerable amount of amiability, good sense, and domestic taste. These she shared with her intended husband, and whilst they made the royal couple always retiring, at the same time they caused them to give, during their lives, a moral air to their court. On the 8th of September Charlotte arrived at St. James's, and that afternoon the marriage took place, the ceremony being performed by the Archbishop of Canterbury. On the 22nd the coronation took place with the greatest splendour. Mother and girls were inconsolable, for each had something that they were sure "Si would like," and would "do him good," but they knew Josiah Klegg, Sr., well enough to understand what was the condition when he had once made up his mind. CHAPTER V. THE YOUNG RECRUITS Si proceeded to deftly construct a litter out of the two guns, with some sticks that he cut with a knife, and bound with pawpaw strips. His voice had sunk very low, almost to sweetness. A soft flurry of pink went over her face, and her eyelids drooped. Then suddenly she braced herself, pulled herself taut, grew combative again, though her voice shook. HoME²Ô¾®Ïè̫ʲôÐÇ×ù
ENTER NUMBET 0016langtel.com.cn
www.fqjxjd.com.cn
fbpghr.com.cn
gxxsgj.com.cn
www.goseven.net.cn
www.mz360.net.cn
www.nxtianli.org.cn
njchain.com.cn
rediandai.com.cn
www.xbdggm.com.cn