ISO/IEC 15946-1:2008
$41.60
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
Published By | Publication Date | Number of Pages |
ISO | 2008-04 | 38 |
If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. It consists of five parts and includes the establishment of keys for symmetric cryptographic techniques, and digital signature mechanisms.
ISO/IEC 15946-1:2008 specifically addresses the general techniques based on elliptic curves. It describes the mathematical background and specifies the general techniques necessary for implementing mechanisms based on elliptic curves defined over finite fields or pairings based on elliptic curves.
ISO/IEC 15946-1:2008 specifies
- conventional functions,
- elliptic curves over any finite field such as a prime field and an extension field with characteristic two or three together with coordinates,
- pairings over an elliptic curve.
Published Code | ISO |
---|---|
Published By | International Organization for Standardization |
Publication Date | 2008-04 |
Pages Count | 38 |
Language | English |
Edition | 2 |
File Size | 542.7 KB |
ICS Codes | 35.030 - IT Security |
Related products
-
BSI PD ISO/IEC TR 15446:2004
Information technology. Security techniques. Guide for the production of protection profiles and security targets Published…
-
BS ISO/IEC 15946-3:2002:2003 Edition
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – Key establishment Published By…
-
BS ISO/IEC 15946-4:2004
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – Digital signatures giving message…
-
BS ISO/IEC 15946-5:2009:2013 Edition
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – Elliptic curve generation Published…
-
BS ISO/IEC 15944-1:2002
Information technology. Business agreement semantic descriptive techniques – Operational aspects of Open-EDI for implementation Published…
-
ISO/IEC 15944-2:2006
Information technology — Business Operational View — Part 2: Registration of scenarios and their components…
-
CAN/CSA-ISO/IEC 15944-1:13:2013 Edition
Information technology – Business operational view – Part 1: Operational aspects of open-EDI for implementation…
-
AS ISO/IEC 15944.1:2005
Information technology – Business agreement semantic descriptive techniques – Business operational aspects of Open-edi for…
-
CSA ISO/IEC 15944-5:15 (R2019):2015 Edition
Information technology – Business operational view – Part 5: Identification and referencing of requirements of…
-
CAN/CSA-ISO/IEC TR 15944-6:16:2016 Edition
Information technology – Business operational view – Part 6: Technical introduction to e-business modeling Published…
-
BS EN ISO 15976:2002:2004 Edition
Closed end blind rivets with break pull mandrel and protruding head. St/St Published By Publication…
-
BS ISO/IEC 15944-5:2008
Information technology. Business operational view – Identification and referencing of requirements of jurisdictional domains as…
-
BS ISO/IEC 15944-2:2006:2007 Edition
Information technology. Business operational view – Registration of scenarios and their components as business objects…
-
CSA ISO/IEC 14888-2:09 (R2019):2009 Edition
Information technology – Security techniques – Digital signatures with appendix – Part 2: Integer factorization-based…
-
BS ISO/IEC 15944-7:2009:2010 Edition
Information technology. Business operational view – eBusiness vocabulary Published By Publication Date Number of Pages…
-
CSA ISO/IEC 15944-8:15 (R2019):2015 Edition
Information technology – Business operational view – Part 8: Identification of privacy protection requirements as…
-
BS EN ISO 15996:2005+A1:2007:2008 Edition
Gas cylinders. Residual pressure valves. General requirements and type testing Published By Publication Date Number…
-
CAN/CSA-ISO/IEC 15944-4:16:2016 Edition
Information technology – Business operational view – Part 4: Business transaction scenarios – Accounting and…
-
ISO/IEC 15948:2004
Information technology — Computer graphics and image processing — Portable Network Graphics (PNG): Functional specification…
-
BS ISO/IEC 15946-1:2002:2003 Edition
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – General Published By Publication…
-
BS ISO/IEC 11770-3:2008:2010 Edition
Information technology. Security techniques. Key management – Mechanisms using asymmetric techniques Published By Publication Date…
-
BS ISO/IEC 15948:2004 (COVERS)
Information technology. Computer Graphics and image processing. Portable Network Graphics (PNG): Functional Specification Published By…
-
CAN/CSA-ISO/IEC 15946-1:18:2018 Edition
Information technology – Security techniques – Cryptographic techniques based on elliptic curves – Part 1:…
-
CSA ISO/IEC 15944-7:15 (R2019):2015 Edition
Information technology – Business operational view – Part 7: eBusiness vocabulary Published By Publication Date…
-
BS ISO/IEC 15946-2:2002:2003 Edition
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – Digital signatures Published By…
-
CAN/CSA-ISO/IEC 26550:16:2016 Edition
Software and systems engineering — Reference model for product line engineering and management Published By…
-
BS ISO/IEC 15944-8:2012
Information technology. Business Operational View – Identification of privacy protection requirements as external constraints on…
-
BSI PD ISO/IEC TR 15446:2009
Information technology. Security techniques. Guide for the production of protection profiles and security targets Published…
-
CSA ISO/IEC 19794-6:20:2020 Edition
Information technology — Biometric data interchange formats — Part 6: Iris image data Published By…
-
BS ISO/IEC 15946-1:2016
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – General Published By Publication…
-
CAN/CSA-ISO/IEC 15944-2:16:2016 Edition
Information technology – Business operational view – Part 2: Registration of scenarios and their components…
-
ISO/IEC 26550:2015
Software and systems engineering — Reference model for product line engineering and management Published By…
-
BS EN ISO 15496:2004:2011 Edition
Textiles. Measurement of water vapour permeability of textiles for the purpose of quality control Published…
-
BS ISO/IEC 15946-1:2008:2014 Edition
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – General Published By Publication…
-
BSI 24/30476110 DC:2024 Edition
BS EN ISO/IEC 15944-7:2009/Amd 1 Information technology – Business operational view – Part 7: eBusiness…
-
ISO/IEC 15946-4:2004
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4:…
-
CAN/CSA-ISO/IEC 15946-4-05:2005 Edition
Information Technology – Security Techniques – Cryptographic Techniques Based on Elliptic Curves – Part 4:…
-
BS ISO/IEC 15946-5:2017
Information technology. Security techniques. Cryptographic techniques based on elliptic curves – Elliptic curve generation Published…
-
BS EN ISO 15496:2018
Textiles. Measurement of water vapour permeability of textiles for the purpose of quality control Published…
-
CSA ISO/IEC TR 15446:20:2020 Edition
Information technology — Security techniques — Guidance for the production of protection profiles and security…