ECDSA using P-256 curve and SHA-256 hash algorithm
ECDSA using P-384 curve and SHA-384 hash algorithm
ECDSA using P-521 curve and SHA-512 hash algorithm
HMAC using SHA-256 hash algorithm
HMAC using SHA-384 hash algorithm
HMAC using SHA-512 hash algorithm
RSASSA using SHA-256 hash algorithm
RSASSA using SHA-384 hash algorithm
RSASSA using SHA-512 hash algorithm
Algorithms to verify JSON web token signatures