ISO/IEC-15946-1 › Historical Revision Information
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General
The following bibliographic material is provided to assist you with your purchasing decision:
ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. It consists of five parts and includes the establishment of keys for symmetric cryptographic techniques, and digital signature mechanisms.
ISO/IEC 15946-1:2008 specifically addresses the general techniques based on elliptic curves. It describes the mathematical background and specifies the general techniques necessary for implementing mechanisms based on elliptic curves defined over finite fields or pairings based on elliptic curves.
ISO/IEC 15946-1:2008 specifies
- conventional functions,
- elliptic curves over any finite field such as a prime field and an extension field with characteristic two or three together with coordinates,
- pairings over an elliptic curve.
To find similar documents by classification:
35.030 (IT Security Including encryption)
This document comes with our free Notification Service, good for the life of the document.
This document is available in either Paper or PDF format.
Document Number
ISO/IEC 15946-1:2008
Revision Level
2ND EDITION
Status
Superseded
Publication Date
April 15, 2008
Committee Number
ISO/IEC/JTC 1/SC 27