The procedure whereby the recipient of a public key checks that the key conforms to the arithmetic requirements for such a key in order to thwart certain types of attacks.
Source(s):
NIST SP 800-56B Rev. 2