• 16/30335567 DC : 0

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    BS ISO/IEC 15946-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 5: ELLIPTIC CURVE GENERATION

    Available format(s):  Hardcopy, PDF

    Superseded date:  30-09-2017

    Language(s):  English

    Published date: 

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative reference(s)
    3 Terms and definitions
    4 Symbols, abbreviations, and conversion functions
    5 Framework for elliptic curve generation
    6 Verifiably pseudo-random elliptic curve generation
    7 Constructing Elliptic Curves by Complex Multiplication
    8 Constructing Elliptic Curves by Lifting
    Annex A (informative) - Background information on
            elliptic curves
    Annex B (informative) - Background information on
            elliptic curve cryptosystems
    Annex C (informative) - Numerical examples
    Annex D (informative) - Summary of properties of
            Elliptic Curves generated by the Complex
            Multiplication method
    Bibliography

    General Product Information - (Show below) - (Hide below)

    Comment Closes On
    Committee IST/33/2
    Document Type Draft
    Publisher British Standards Institution
    Status Superseded
    Superseded By

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
    ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective