From 312d75dfde67bcd51fb9c51d4af5bceea3c6d1c1 Mon Sep 17 00:00:00 2001 From: Paul Kehrer Date: Wed, 24 May 2017 13:18:02 -0700 Subject: Update the docs to not be redundant and wrong (#3593) --- docs/hazmat/primitives/asymmetric/index.rst | 3 --- 1 file changed, 3 deletions(-) (limited to 'docs/hazmat') diff --git a/docs/hazmat/primitives/asymmetric/index.rst b/docs/hazmat/primitives/asymmetric/index.rst index 4242a0bd..e0080f0e 100644 --- a/docs/hazmat/primitives/asymmetric/index.rst +++ b/docs/hazmat/primitives/asymmetric/index.rst @@ -20,9 +20,6 @@ symmetric encryption. Someone with the public key is able to encrypt a message, providing confidentiality, and then only the person in possession of the private key is able to decrypt it. -Cryptography supports three different sets of asymmetric algorithms: RSA, DSA, -and Elliptic Curve. - .. toctree:: :maxdepth: 1 -- cgit v1.2.3