Examples using public key, or asymmetric key, cryptography for encryption, key agreement, and digital signatures.