IEC - International Electrotechnical Commission - ISO/IEC 14888-3:2018

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms

published
Buy Now
Organization: IEC - International Electrotechnical Commission
Publication Date: 12 November 2018
Status: published
Page Count: 155
ICS Code (IT Security): 35.030
abstract:

ISO/IEC 14888-3:2018 This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.
This document provides
- a general... View More

Document History

ISO/IEC 14888-3:2018
November 12, 2018
IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
ISO/IEC 14888-3:2018 This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides - a general description of a...
March 17, 2016
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
ISO/IEC 14888-3:2016 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. ISO/IEC 14888-3:2016 provides - a general description of a digital...
Amendment 2 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - Optimizing hash inputs
A description is not available for this item.
Amendment 1 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
A description is not available for this item.
February 16, 2009
Corrigendum 2 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -
A description is not available for this item.
Corrigendum 1 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -
A description is not available for this item.
November 13, 2006
Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
ISO/IEC 14888-3:2006 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. It provides a general description of a digital signature with...
Advertisement