UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 14888-2

Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms TECHNICAL CORRIGENDUM 1

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 October 2015
Status: active
Page Count: 3
ICS Code (Information coding): 35.040

Document History

ISO/IEC 14888-2
October 1, 2015
Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms TECHNICAL CORRIGENDUM 1
A description is not available for this item.
April 15, 2008
Information technology - Security techniques - Digital signatures with appendix Part 2: Integer factorization based mechanisms
This part of ISO/IEC 14888 specifies digital signatures with appendix whose security is based on the difficulty of factoring the modulus in use. For each signature scheme, it specifies: a) the...
December 15, 1999
Information Technology - Security Techniques - Digital Signatures with Appendix - Part 2: Identity-Based Mechanisms
A description is not available for this item.

References

Advertisement