M00028517
New product
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION
International Organization for Standardization
In stock
Warning: Last items in stock!
Availability date: 11/05/2021
Foreword <br>Introduction <br>1 Scope<br>2 Normative references <br>3 Terms and definitions<br>4 Symbols and notations<br>5 Finite fields and elliptic curves <br>6 Conversion functions <br>7 Cryptographic transformations<br>8 General model for signcryption<br>9 Discrete logarithm based signcryption mechanism (DLSC)<br>10 Elliptic curve based signcryption mechanism (ECDLSC)<br>11 Integer factorization based signcryption mechanism (IFSC)<br>12 Encrypt-then-sign-based mechanism (EtS) <br>Annex A (normative) - Object identifiers<br>Annex B (informative) - Security considerations<br>Annex C (informative) - Guidance on use of the mechanisms<br>Annex D (informative) - Examples<br>Bibliography
Describes four mechanisms for signcryption that employ public key cryptographic techniques requiring both the originator and the recipient of protected data to have their own public and private key pairs.
Published | |
Document Type | Standard |
Status | Current |
Publisher | International Organization for Standardization |
Pages | |
ISBN | |
Committee | JTC 1 |