This is a list of all the topics and their descriptions:
| Session | Client session management with HSM |
| Management | HSM Management |
| Users | HSM user management |
| Keys | Managing the life cycle of cryptographic keys in HSM |
| SVault | Data tokenization and anonymization operations |
| Cryptography | Symmetric and asymmetric cryptographic hash operations |
| EFT | Electronic Funds Transfer Operations |
| PKCS#7 | PKCS#7 standard signature |
| XML | XML Signature, including Electronic Invoice (NF-e) |
| Pix | Operations aimed at Pix of the SPI (Instant Payments System) |
| Memory | Memory allocation and deallocation |
| OATH | Standard authentication OATH |
| SPB | Encode and Decode operations according to the SPB standard |
| Blockchain | Operations to support the security of Blockchain-based structures |
| Safe Keeping | Managing shared secrets |