ISO/IEC-15946-1 Historical Revision Information
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General

ISO/IEC-15946-1 - 2ND EDITION - SUPERSEDED
Show Complete Document History

Document Center Inc. is an authorized dealer of ISO standards.
The following bibliographic material is provided to assist you with your purchasing decision:


ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. It consists of five parts and includes the establishment of keys for symmetric cryptographic techniques, and digital signature mechanisms.

ISO/IEC 15946-1:2008 specifically addresses the general techniques based on elliptic curves. It describes the mathematical background and specifies the general techniques necessary for implementing mechanisms based on elliptic curves defined over finite fields or pairings based on elliptic curves.

ISO/IEC 15946-1:2008 specifies

  • conventional functions,
  • elliptic curves over any finite field such as a prime field and an extension field with characteristic two or three together with coordinates,
  • pairings over an elliptic curve.
ORDER

To find similar documents by classification:

35.030 (IT Security Including encryption)

35.040 (Character sets and information coding Including coding of audio, picture, multimedia and hypermedia information, IT security techniques, encryption, bar coding, electronic signatures, etc.)

This document comes with our free Notification Service, good for the life of the document.

This document is available in either Paper or PDF format.

Document Number

ISO/IEC 15946-1:2008

Revision Level

2ND EDITION

Status

Superseded

Publication Date

April 15, 2008

Committee Number

ISO/IEC/JTC 1/SC 27