17/30352205 DC : 0
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
BS ISO/IEC 11770-3:2015/AMD 1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES
Hardcopy , PDF
English
31-01-2018
Foreword
Reason for Amendment
11.13 Key agreement mechanism 13
11.14 Key agreement mechanism 14
Annex A (normative) - Object identifiers
Annex B (informative) - Properties of key
establishment mechanisms
Annex E (informative) - Examples of elliptic
curve based key establishment
mechanisms
Bibliography
BS ISO/IEC 11770-3:2015/Amd 1.
| Committee |
IST/33/2
|
| DocumentType |
Draft
|
| Pages |
16
|
| PublisherName |
British Standards Institution
|
| Status |
Superseded
|
| SupersededBy |
| ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption |
| ISO/IEC 11770-6:2016 | Information technology — Security techniques — Key management — Part 6: Key derivation |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.