Norm

NEN-ISO/IEC 15946-5:2010 en

Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation

Volledig inclusief:

124,99

Over deze norm

Status Definitief
Aantal pagina's 31
Commissie Informatiebeveiliging, Cyber security en Privacy
Gepubliceerd op 01-01-2010
Taal Engels
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. This part of ISO/IEC 15946 defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3 and ISO/IEC 18033-2. The scope of this part of ISO/IEC 15946 is restricted to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field (i.e. which basis is used) is outside the scope of this part of ISO/IEC 15946. ISO/IEC 15946 does not specify the implementation of the techniques it defines. Interoperability of products complying with ISO/IEC 15946 will not be guaranteed.

Details

ICS-code 35.040
Engelse titel Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
Gewijzigd door

Winkelwagen

Subtotaal:

Ga naar winkelwagen