Shopping Cart

No products in the cart.

ISO/IEC 14888-3:2018

$55.25

IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms

Published By Publication Date Number of Pages
ISO 2018-11 166
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.

This document provides

— a general description of a digital signature with appendix mechanism, and

— a variety of mechanisms that provide digital signatures with appendix.

For each mechanism, this document specifies

— the process of generating a pair of keys,

— the process of producing signatures, and

— the process of verifying signatures.

Annex A defines object identifiers assigned to the digital signature mechanisms specified in this document, and defines algorithm parameter structures.

Annex B defines conversion functions of FE2I, I2FE, FE2BS, BS2I, I2BS, I2OS and OS2I used in this document.

Annex D defines how to generate DSA domain parameters.

ISO/IEC 14888-3:2018
$55.25