M00027332
New product
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES
International Organization for Standardization
In stock
Warning: Last items in stock!
Availability date: 11/05/2021
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Unilateral authentication mechanism based on
discrete logarithms on elliptic curves
6 Unilateral authenticated key exchange mechanism
based on encryption
7 Identity-based signature mechanism
8 Unilateral authentication mechanism based on discrete
logarithms on elliptic curves over finite fields
of characteristic two
Annex A (normative) - Object identifiers
Annex B (normative) - Memory-Computation Trade-Off
Technique
Annex C (informative) - Numerical examples
Annex D (informative) - Features
Annex E (normative) - ELLI_163.1 and ELLI_193.1
Annex F (informative) - Some special properties of
elliptic curves over F(2[g])
Annex G (informative) - ELLI - Security Considerations
Annex H (informative) - ELLI - Implementation options
Bibliography
Describes three lightweight mechanisms using asymmetric techniques: - a unilateral authentication mechanism based on discrete logarithms on elliptic curves; - an authenticated lightweight key exchange (ALIKE) mechanism for unilateral authentication and establishment of a session key; - an identity-based signature mechanism.
Published | |
Document Type | Standard |
Status | Current |
Publisher | International Organization for Standardization |
Pages | |
ISBN | |
Committee | JTC 1 |