UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Webinars & White Papers

CSA ISO/IEC 15946-1

Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General

active, Most Current
Buy Now
Organization: CSA
Publication Date: 1 January 2018
Status: active
Page Count: 48
ICS Code (Information coding): 35.040
scope:

This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, ISO/IEC 18033-2 and other ISO/IEC standards.

This part of ISO/IEC 15946 does not specify the implementation of the techniques it defines. For example, it does not specify the basis representation to be used when the elliptic curve is defined over a finite field of characteristic two. Thus, interoperability of products complying with this part of ISO/IEC 15946 will not be guaranteed.

Document History

CSA ISO/IEC 15946-1
January 1, 2018
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing the elliptic curve cryptography mechanisms defined in ISO/IEC 15946-5, ISO/IEC...
October 1, 2009
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These include the establishment of keys for secret-key systems, and digital signature mechanisms. This part of...
October 1, 2009
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These include the establishment of keys for secret-key systems, and digital signature mechanisms. This part of...
January 1, 2009
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These include the establishment of keys for secret-key systems, and digital signature mechanisms. This part of...
January 1, 2009
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These include the establishment of keys for secret-key systems, and digital signature mechanisms. This part of...
January 1, 2004
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
International Standard ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. They include the establishment of keys for secret-key systems, and digital signature...

References

Advertisement