BS ISO/IEC 9796-3:2006
Current
The latest, up-to-date edition.
Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms
Hardcopy , PDF
English
28-02-2014
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols, notation and conventions
5 Binding between signature mechanisms
and hash-functions
6 Framework for digital signatures giving
message recovery
7 General model for digital signatures giving
message recovery
8 NR (Nyberg-Rueppel message recovery
signature)
9 ECNR (Elliptic Curve Nyberg-Rueppel message
recovery signature)
10 ECMR (Elliptic Curve Miyaji message recovery
signature)
11 ECAO (Elliptic Curve Abe-Okamoto message
recovery signature)
12 ECPV (Elliptic Curve Pintsov-Vanstone message
recovery signature)
13 ECKNR (Elliptic Curve KCDSA/Nyberg-Rueppel
message recovery signature)
Annex A (informative) - Mathematical conventions
Annex B (normative) - Conversion functions
Annex C (normative) - Mask generation functions (Key
derivation functions)
Annex D (informative) - Example method for producing
the data input
Annex E (normative) - ASN.1 module
Annex F (informative) - Numerical examples
Annex G (informative) - Summary of properties of
mechanisms
Annex H (informative) - Correspondence of schemes
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.