aboutsummaryrefslogtreecommitdiffstats
path: root/docs/hazmat/primitives/asymmetric/index.rst
diff options
context:
space:
mode:
Diffstat (limited to 'docs/hazmat/primitives/asymmetric/index.rst')
-rw-r--r--docs/hazmat/primitives/asymmetric/index.rst10
1 files changed, 5 insertions, 5 deletions
diff --git a/docs/hazmat/primitives/asymmetric/index.rst b/docs/hazmat/primitives/asymmetric/index.rst
index 4242a0bd..c27e1781 100644
--- a/docs/hazmat/primitives/asymmetric/index.rst
+++ b/docs/hazmat/primitives/asymmetric/index.rst
@@ -20,18 +20,18 @@ symmetric encryption. Someone with the public key is able to encrypt a message,
providing confidentiality, and then only the person in possession of the
private key is able to decrypt it.
-Cryptography supports three different sets of asymmetric algorithms: RSA, DSA,
-and Elliptic Curve.
-
.. toctree::
:maxdepth: 1
- dsa
+ ed25519
+ x25519
+ ed448
+ x448
ec
rsa
dh
+ dsa
serialization
- interfaces
utils