UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ISO/IEC 15946-1

Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General

active, Most Current
Buy Now
Organization: ISO
Publication Date: 1 July 2016
Status: active
Page Count: 38
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, ISO/IEC 18033-2 and other ISO/IEC standards.

This part of ISO/IEC 15946 does not specify the implementation of the techniques it defines. For example, it does not specify the basis representation to be used when the elliptic curve is defined over a finite field of characteristic two. Thus, interoperability of products complying with this part of ISO/IEC 15946 will not be guaranteed.

Document History

ISO/IEC 15946-1
July 1, 2016
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC...
April 1, 2014
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General TECHNICAL CORRIGENDUM 2
A description is not available for this item.
February 15, 2009
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General TECHNICAL CORRIGENDUM 1
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These include the establishment of keys for secret-key systems, and digital signature mechanisms. This part of...
April 15, 2008
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These include the establishment of keys for secret-key systems, and digital signature mechanisms. This part of...
December 1, 2002
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
A description is not available for this item.

References

Advertisement