• There are no items in your cart

BS ISO/IEC 9796-3:2006

Current

Current

The latest, up-to-date edition.

Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

28-02-2014

€348.24
Excluding VAT

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols, notation and conventions
5 Binding between signature mechanisms
   and hash-functions
6 Framework for digital signatures giving
   message recovery
7 General model for digital signatures giving
   message recovery
8 NR (Nyberg-Rueppel message recovery
   signature)
9 ECNR (Elliptic Curve Nyberg-Rueppel message
   recovery signature)
10 ECMR (Elliptic Curve Miyaji message recovery
   signature)
11 ECAO (Elliptic Curve Abe-Okamoto message
   recovery signature)
12 ECPV (Elliptic Curve Pintsov-Vanstone message
   recovery signature)
13 ECKNR (Elliptic Curve KCDSA/Nyberg-Rueppel
   message recovery signature)
Annex A (informative) - Mathematical conventions
Annex B (normative) - Conversion functions
Annex C (normative) - Mask generation functions (Key
        derivation functions)
Annex D (informative) - Example method for producing
        the data input
Annex E (normative) - ASN.1 module
Annex F (informative) - Numerical examples
Annex G (informative) - Summary of properties of
        mechanisms
Annex H (informative) - Correspondence of schemes
Bibliography

Defines six digital signature schemes giving message recovery and specifies an optional control field in the hash-token, which can provide added security to the signature.

Committee
IST/33/2
DevelopmentNote
Supersedes 04/30117200 DC. (10/2006)
DocumentType
Standard
Pages
82
PublisherName
British Standards Institution
Status
Current
Supersedes

Standards Relationship
ISO/IEC 9796-3:2006 Identical

ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 14888-1:2008 Information technology — Security techniques — Digital signatures with appendix — Part 1: General
ISO/IEC 15946-5:2017 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation
ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.