ISO/IEC 15946-5:2009 PDF

ISO/IEC 15946-5:2009 PDF

Name:
ISO/IEC 15946-5:2009 PDF

Published Date:
12/15/2009

Status:
Active

Description:

Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation

Publisher:
International Organization for Standardization/International Electrotechnical Commission

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$48.6
Need Help?

ISO/IEC 15946 specifies public-key cryptographic techniques based on elliptic curves. They include the establishment of keys for secret-key systems and digital signature mechanisms.

ISO/IEC 15946-5:2009 defines the elliptic curve generation techniques useful for implementing the mechanisms defined in ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3, and ISO/IEC 18033-2.

The scope of ISO/IEC 15946-5:2009 is restricted to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). The representation of elements of the underlying finite field (i.e. which basis is used) is outside the scope of ISO/IEC 15946-5:2009. ISO/IEC 15946 does not specify the implementation of the techniques it defines. Interoperability of products complying with ISO/IEC 15946 will not be guaranteed.


File Size : 1 file , 400 KB
Note : This product is unavailable in Russia, Ukraine, Belarus
Published : 12/15/2009
Same As : ISO/IEC 15946-5:2009

History

ISO/IEC 15946-5:2022
Published Date: 03/01/2022
Information security - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
$58.2
ISO/IEC 15946-5:2017
Published Date: 08/01/2017
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
$52.5
ISO/IEC 15946-5:2009/Cor1:2012
Published Date: 12/01/2012
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation - Corrigendum 1
Free Download
ISO/IEC 15946-5:2009
Published Date: 12/15/2009
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 5: Elliptic curve generation
$48.6

Related products

ISO/IEC 19795-7:2011
Published Date: 01/15/2011
Information technology - Biometric performance testing and reporting - Part 7: Testing of on-card biometric comparison algorithms
$49.8

Best-Selling Products

CAN/CSA-ISO/IEC TS 11801-9903:21
Published Date: 10/11/2021
Information technology - Generic cabling systems for customer premises - Part 9903: Matrix modelling of channels and links (ISO/IEC TS 11801-9903:2021, IDT)
$51.9
CAN/CSA-ISO/IEC TS 16085-05
Published Date: 10/01/2005
Information Technology - Software Life Cycle Processes - Risk Management (Adopted ISO/IEC 16085:2004 / IEEE 1540-2001, first edition, 2004-10-01)
$34.5
CAN/CSA-ISO/IEC TS 17961:18 (R2022)
Published Date: 01/01/2018
Information technology - Programming languages, their environments and system software interfaces - C secure coding rules (Adopted ISO/IEC TS 17961:2013, first edition, 2013-11-15, including adopted technical corrigendum 1:2016)
$62.7
CAN/CSA-ISO/IEC TS 18661-5:18 (R2022)
Published Date: 01/01/2018
Information technology - Programming languages, their environments, and system software interfaces - Floating-point extensions for C - Part 5: Supplementary attributes (Adopted ISO/IEC TS 18661-5:2016, first edition, 2016-08-15)
$41.7
CAN/CSA-ISO/IEC TS 19570:20
Published Date: 03/01/2020
Programming Languages - Technical Specification for C++ Extensions for Parallelism (Adopted ISO/IEC TS 19570:2018, second edition, 2018-11)
$51
CAN/CSA-ISO/IEC TS 19608:19
Published Date: 10/01/2019
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408 (Adopted ISO/IEC TS 19608:2018, first edition, 2018-10)
$51