IEC - International Electrotechnical Commission - ISO/IEC 11770-4:2017/AMD1:2019

Amendment 1 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)

published
Buy Now
Organization: IEC - International Electrotechnical Commission
Publication Date: 6 September 2019
Status: published
Page Count: 15
ICS Code (IT Security): 35.030

Document History

ISO/IEC 11770-4:2017/AMD1:2019
September 6, 2019
Amendment 1 - Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets - Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
A description is not available for this item.
November 17, 2017
Information technology - Security techniques - Key management - Part 4: Mechanisms based on weak secrets
ISO/IEC 11770-4:2017 defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small...
September 4, 2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets -
A description is not available for this item.
May 4, 2006
Information technology -- Security techniques -- Key management -- Part 4: Mechanisms based on weak secrets
ISO/IEC 11770-4:2006 defines key establishment mechanisms based on weak secrets, i.e., secrets that can be readily memorized by a human, and hence secrets that will be chosen from a relatively small...
Advertisement