📄️ Create Secure HMAC
In the following section, you will see a diagram of the cryptographic operations performed when calling the method createSecureHmac
📄️ Symmetric Secure Data Encrypt
In the following section, you will see a diagram of the cryptographic operations performed when calling the method symmetricSecureDataEncrypt