17/30352205 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS ISO/IEC 11770-3:2015/AMD 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
Hardcopy , PDF
31-01-2018
English
Foreword
Reason for Amendment
11.13 Key agreement mechanism 13
11.14 Key agreement mechanism 14
Annex A (normative) - Object identifiers
Annex B (informative) - Properties of key
establishment mechanisms
Annex E (informative) - Examples of elliptic
curve based key establishment
mechanisms
Bibliography
BS ISO/IEC 11770-3:2015/Amd 1.
Committee |
IST/33/2
|
DocumentType |
Draft
|
Pages |
16
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
ISO/IEC 19772:2009 | Information technology Security techniques Authenticated encryption |
ISO/IEC 11770-6:2016 | Information technology Security techniques Key management Part 6: Key derivation |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.