UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 9796-3

Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms

active, Most Current
Buy Now
Organization: ISO
Publication Date: 15 September 2006
Status: active
Page Count: 78
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery. The security of these schemes is based on the difficulty of the discrete logarithm problem, which is defined on a finite field or an elliptic curve over a finite field.

This part of ISO/IEC 9796 also defines an optional control field in the hash-token, which can provide added security to the signature.

This part of ISO/IEC 9796 specifies randomized mechanisms.

The mechanisms specified in this part of ISO/IEC 9796 give either total or partial message recovery.

NOTE For discrete logarithm based digital signature schemes with appendix, see ISO/IEC 14888-3.

Document History

ISO/IEC 9796-3
September 15, 2006
Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms
This part of ISO/IEC 9796 specifies six digital signature schemes giving message recovery. The security of these schemes is based on the difficulty of the discrete logarithm problem, which is defined...
September 15, 2006
Information technology Security techniques Digital signature schemes giving message recovery Part 3: Discrete logarithm based mechanisms
A description is not available for this item.
April 15, 2000
Information Technology - Security Techniques - Digital Signature Schemes Giving Message Recovery - Part 3: Discrete Logarithm Based Mechanisms
A description is not available for this item.
January 1, 1991
Information Technology - Security Techniques - Digital Signature Scheme Giving Message Recovery
A description is not available for this item.

References

Advertisement