Logo
Login Sign Up
Current Revision

ISO/IEC 14888-3:2018

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms
Best Price Guarantee
Instant

$278.00

2-5 Days

$278.00

SAVE 15%

$472.60


Sub Total (1 Item(s))

$ 0.00

Estimated Shipping

$ 0.00

Total (Pre-Tax)

$ 0.00


or
International Organization for Standardization Logo

ISO/IEC 14888-3:2018

IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms

ISO/IEC 14888-3:2018

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

— a general description of a digital signature with appendix mechanism, and

— a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

— the process of generating a pair of keys,

— the process of producing signatures, and

— the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.

SDO ISO: International Organization for Standardization
Document Number ISO/IEC 14888
Publication Date Not Available
Language en - English
Page Count
Revision Level
Supercedes
Committee ISO/IEC JTC 1/SC 27
Publish Date Document Id Type View
Not Available ISO/IEC 14888-3:2018 Revision