This section lists several algorithms used to compute hashes and digital signatures. Each of these algorithms is supported by the Microsoft Base Cryptographic Provider. However, the internal details of these algorithms are well beyond the scope of this document. For a list of additional sources refer to Related Documentation.