• CSA ISO/IEC 15946-4 : 2005

    Withdrawn A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

    INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 4: DIGITAL SIGNATURES GIVING MESSAGE RECOVERY

    Available format(s):  Hardcopy, PDF

    Withdrawn date:  25-01-2010

    Language(s):  English

    Published date:  31-12-2004

    Publisher:  Canadian Standards Association

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Normative references
    3 Terms and definitions
    4 Symbols and abbreviated terms
       4.1 Symbols and notation
       4.2 Coding convention, length and field size
       4.3 Legend for figures
    5 Processes
       5.1 Parameter Generation Process
       5.2 Signature Generation Process
       5.3 Signature Verification Process
    6 General Model for Digital Signatures giving message
       recovery
       6.1 Requirements
       6.2 Summary of Functions and Procedures
       6.3 Signature generation process
       6.4 Signature verification process
    7 ECNR (Elliptic Curve Nyberg-Rueppel message recovery
       signature)
       7.1 Domain and User Parameters
       7.2 Signature Generation Process
       7.3 Signature Verification Process
    8 ECMR (Elliptic Curve Miyaji message Recovery signature)
       8.1 Domain and User Parameters
       8.2 Signature Generation Process
       8.3 Signature Verification Process
    9 ECAO (Elliptic Curve Abe-Okamoto message recovery
       signature)
       9.1 Domain and User Parameters
       9.2 Signature Generation Process
       9.3 Signature Verification Process
    10 ECPV (Elliptic Curve Pintsov-Vanstone message recovery
       signature)
       10.1 Domain and User Parameters
       10.2 Signature Generation Process
       10.3 Signature Verification Process
    11 ECKNR (Elliptic Curve KCDSA/Nyberg-Rueppel message
       recovery signature)
       11.1 Domain and User Parameters
       11.2 Signature Generation Process
       11.3 Signature Verification Process
    Annex A (informative) Numerical examples
    Annex B (informative) Summary of properties of mechanisms
    Annex C (informative) Information about patents
    Bibliography

    Abstract - (Show below) - (Hide below)

    Specifies public-key cryptographic techniques based on elliptic curves. These techniques include methods for the establishment of keys for symmetric cryptographic techniques, and digital signature mechanisms.

    General Product Information - (Show below) - (Hide below)

    Document Type Standard
    Publisher Canadian Standards Association
    Status Withdrawn

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
    ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
    ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
    ANSI X9.63 : 2011 FINANCIAL SERVICES - PUBLIC KEY CRYPTOGRAPHY FOR THE FINANCIAL SERVICES INDUSTRY, KEY AGREEMENT AND KEY TRANSPORT USING ELLIPTIC CURVE CRYPTOGRAPHY
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective