• Shopping Cart
    There are no items in your cart

ISO/IEC 15946-5:2017

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Information technology Security techniques Cryptographic techniques based on elliptic curves Part 5: Elliptic curve generation

Available format(s)

Hardcopy , PDF , PDF 3 Users , PDF 5 Users , PDF 9 Users

Withdrawn date

22-06-2021

Superseded by

ISO/IEC 15946-5:2022

Language(s)

English

Published date

11-08-2017

€60.00
Excluding VAT

The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 159461.

ISO/IEC 15946-5:2017 defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 291924, ISO/IEC 97963, ISO/IEC 117703, ISO/IEC 148883 and ISO/IEC 180332.

ISO/IEC 15946-5:2017 is applicable to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). This document is not applicable to the representation of elements of the underlying finite field (i.e. which basis is used).

The ISO/IEC 15946 series does not specify the implementation of the techniques it defines. Interoperability of products complying with the ISO/IEC 15946 series will not be guaranteed.

DocumentType
Standard
Pages
30
PublisherName
International Organization for Standardization
Status
Withdrawn
SupersededBy
Supersedes

Standards Relationship
NEN ISO/IEC 15946-5 : 2017 Identical
BS ISO/IEC 15946-5:2017 Identical

BS EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions
BS ISO/IEC 9796-3:2006 Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms
I.S. EN 419212-2:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
I.S. EN 419212-1:2017 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
12/30236955 DC : 0 BS ISO/IEC 20008-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURE - PART 2: MECHANISMS USING A GROUP PUBLIC KEY
12/30255296 DC : DRAFT MAR 2012 BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES
BS ISO/IEC 18370-2:2016 Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms
15/30318285 DC : 0 BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL
BS ISO/IEC 15946-1:2016 Information technology. Security techniques. Cryptographic techniques based on elliptic curves General
ISO/IEC 18370-2:2016 Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms
ISO/IEC 29150:2011 Information technology — Security techniques — Signcryption
ISO/IEC 11889-1:2015 Information technology — Trusted platform module library — Part 1: Architecture
12/30255293 DC : 0 BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
16/30345808 DC : 0 BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
BS ISO/IEC 29150:2011 Information technology. Security techniques. Signcryption
BS ISO/IEC 20008-2:2013 Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key
UNI EN 419212-1 : 2015 APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES
PREN 419212-1 : DRAFT 2016 APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS
14/30302798 DC : 0 BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE
BS EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services
16/30345811 DC : 0 BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
EN 419212-1:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
EN 419212-2:2017 Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
BS ISO/IEC 11889-1:2009 Information technology. Trusted platform module Overview
ISO/IEC 20008-2:2013 Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
15/30268565 DC : 0 BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS
CAN/CSA-ISO/IEC 11889-1:16 Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15)
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
CAN/CSA-ISO/IEC 15946-1:18 Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2016, third edition, 2016-07-01)

ISO/IEC 18032:2005 Information technology Security techniques Prime number generation
ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
ISO/IEC 18033-2:2006 Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
ISO/IEC 9796-3:2006 Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
FIPS PUB 186 : 0 DIGITAL SIGNATURE STANDARD (DSS)
ISO/IEC 29192-4:2013 Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.