BS ISO/IEC 14888-2:2008
Current
The latest, up-to-date edition.
Information technology. Security techniques. Digital signatures with appendix Integer factorization based mechanisms
Hardcopy , PDF
English
31-10-2015
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 General
6 RSA and RW schemes
7 GQ1 scheme (identity-based scheme)
8 GQ2 scheme
9 GPS1 scheme
10 GPS2 scheme
11 ESIGN scheme
Annex A (normative) Object identifiers
Annex B (informative) Guidance on parameter choice
and comparison of signature schemes
Annex C (informative) Numerical examples
Annex D (informative) Two other format mechanisms
for RSA/RW schemes
Annex E (informative) Products allowing message
recovery for RSA/RW verification mechanisms
Annex F (informative) Products allowing two-pass
authentication for GQ/GPS schemes
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.