IEC - International Electrotechnical Commission - ISO/IEC 14888-3:2006/AMD1:2010
Amendment 1 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
revised
Buy Now
Organization: | IEC - International Electrotechnical Commission |
Publication Date: | 4 June 2010 |
Status: | revised |
Page Count: | 27 |
ICS Code (IT Security): | 35.030 |
Document History

November 12, 2018
IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
ISO/IEC 14888-3:2018 This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides - a general description of a...

March 17, 2016
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
ISO/IEC 14888-3:2016 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. ISO/IEC 14888-3:2016 provides - a general description of a digital...

June 27, 2012
Amendment 2 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - Optimizing hash inputs
A description is not available for this item.

ISO/IEC 14888-3:2006/AMD1:2010
June 4, 2010
Amendment 1 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms - Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm
A description is not available for this item.

February 16, 2009
Corrigendum 2 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -
A description is not available for this item.

August 16, 2007
Corrigendum 1 - Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -
A description is not available for this item.

November 13, 2006
Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms
ISO/IEC 14888-3:2006 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. It provides a general description of a digital signature with...