CAN/CSA-ISO/IEC 15946-1-09 (R2014) PDF

CAN/CSA-ISO/IEC 15946-1-09 (R2014) PDF

Name:
CAN/CSA-ISO/IEC 15946-1-09 (R2014) PDF

Published Date:
10/01/2009

Status:
Active

Description:

Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2008, second edition, 2008-04-15), Includes Technical Corrigendum 1:2013, Technical Corrigendum 2:2015

Publisher:
Canada National Standard/Canadian Standards - ISO/IEC

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
Need Help?
1 Scope

ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. These include the establishment of keys for secret-key systems, and digital signature mechanisms.

This part of ISO/IEC 15946 describes the mathematical background and general techniques necessary for implementing any of the mechanisms described in other parts of ISO/IEC 15946 and other ISO/IEC standards.

The scope of this part of ISO/IEC 15946 is restricted to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field when the field is not of prime order (i.e. which basis is used) is outside the scope of this part of ISO/IEC 15946.

ISO/IEC 15946 does not specify the implementation of the techniques it defines. Interoperability of products complying with this part of ISO/IEC 15946 will not be guaranteed.
Number of Pages : 54
Published : 10/01/2009

History

CAN/CSA-ISO/IEC 15946-1:18 (R2022)
Published Date: 01/01/2018
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2016, third edition, 2016-07-01)
$47.7
CAN/CSA-ISO/IEC 15946-1-09 (R2014)
Published Date: 10/01/2009
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2008, second edition, 2008-04-15), Includes Technical Corrigendum 1:2013, Technical Corrigendum 2:2015
CAN/CSA-ISO/IEC 15946-1-04
Published Date: 01/01/2004
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves - Part 1: General (Adopted ISO/IEC 15946-1:2002, first edition, 2002-12-01)
$34.5

Related products

CAN/CSA-ISO/IEC 13712-1A-00 (R2019)
Published Date: 04/01/2000
Information Technology - Remote Operations: Concepts, Model and Notation - AMENDMENT 1: Built-In Operations (Adopted ISO/IEC 13712-1:1995, Amendment 1:1996)
$14.1
CAN/CSA-ISO/IEC 8859-6-02 (R2015)
Published Date: 03/19/2002
Information technology - 8-Bit Single-Byte Coded Graphic Character Sets - Part 6: Latin/Arabic Alphabet
$18.9
CAN/CSA-ISO/IEC Telecom Organizations Packages
Published Date:
TELECOM ORGANIZATIONS PACKAGE - Consists of the following CAN/CSA-ISO/IEC Information technology - Security techniques - Information security management systems standards: 27000:11, 27001-06, 27002-08; 27003-10, 27004-10, 27005-09, and 27011:11.
$104.7
CAN/CSA-ISO/IEC 9075-3:18 (R2022)
Published Date: 01/01/2018
Information technology - Database languages - SQL - Part 3: Call-level interface (SQL/CLI) (Adopted ISO/IEC 9075-3:2016, fifth edition, 2016-12-15)
$68.7

Best-Selling Products