{"id":462608,"date":"2024-10-20T10:23:11","date_gmt":"2024-10-20T10:23:11","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-14888-42024\/"},"modified":"2024-10-26T19:15:51","modified_gmt":"2024-10-26T19:15:51","slug":"bs-iso-iec-14888-42024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-14888-42024\/","title":{"rendered":"BS ISO\/IEC 14888-4:2024"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and abbreviated terms 4.1 Symbols <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Abbreviated terms 5 XMSS and XMSS-MT 5.1 General 5.2 Common building blocks 5.2.1 General 5.2.2 Address format <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2.3 Required cryptographic functions <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5.2.4 Auxiliary functions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.2.5 WOTS+ One-Time Signature Auxiliary Scheme <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.3 XMSS Algorithms 5.3.1 General 5.3.2 Auxiliary functions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.3.3 XMSS Key Generation <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.3.4 XMSS Signing <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.3.5 XMSS Authentication Path Computation 5.3.6 XMSS Verification <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.4 XMSS-MT Algorithms 5.4.1 General 5.4.2 XMSS-MT key Generation <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 5.4.3 XMSS-MT signing <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 5.4.4 XMSS-MT Verification <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.5 Suggested parameters <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6 LMS and HSS schemes 6.1 Byte ordering convention 6.2 Converting to base 2W 6.3 Checksum Calculation <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.4 Type code 6.5 LM-OTS 6.5.1 General 6.5.2 Key generation <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.5.3 Signing <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.5.4 Verification 6.5.5 Suggested Parameters <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.6 LMS 6.6.1 General 6.6.2 Key generation <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.6.3 Signing 6.6.4 Verification <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.6.5 Suggested Parameters 6.7 HSS 6.7.1 General <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.7.2 Key generation <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.7.3 Signing 6.7.4 Verification <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 6.7.5 Suggested Parameters 7 State management <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex A (normative) Object identifiers and ASN.1 module <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Annex B (informative) Relation to other standards <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | Annex C (informative) Numerical examples <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security. Digital signatures with appendix – Stateful hash-based mechanisms<\/b><\/p>\n |