IEEE 1363a-2004
$62.83
IEEE Standard Specifications for Public-Key Cryptography – Amendment 1: Additional Techniques
Published By | Publication Date | Number of Pages |
IEEE | 2004 |
Amendment Standard – Inactive-Reserved. Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | Title Page |
4 | Introduction |
5 | Notice to users Errata Interpretations Patents Organization |
6 | Participants |
8 | CONTENTS |
10 | Editor’s Note |
11 | 1. Overview 1.1 Scope 1.2 Purpose 2. References |
12 | 3. Definitions |
13 | 4. Types of cryptographic techniques 4.2 Primitives 4.3 Schemes 4.4 Additional methods |
14 | 4.5 Table summary |
16 | 5. Mathematical conventions 5.1 Mathematical notation |
18 | 5.4 Elliptic curves and points 5.5 Data type conversion |
24 | 6. Primitives based on the discrete logarithm problem 6.2 Primitives |
30 | 7. Primitives based on the elliptic curve discrete logarithm problem 7.2 Primitives |
35 | 8. Primitives based on the integer factorization problem |
37 | 8.2 Primitives |
42 | 9. Key agreement schemes 9.2 DL/ECKAS-DH1 |
43 | 9.3 DL/ECKAS-DH2 |
44 | 9.4 DL/ECKAS-MQV |
45 | 10. Signature schemes 10.1 General model |
47 | 10.2 DL/ECSSA |
48 | 10.3 IFSSA |
50 | 10.4 DL/ECSSR |
52 | 10.5 DL/ECSSR-PV |
55 | 10.6 IFSSR |
57 | 11. Encryption schemes 11.1 General model |
59 | 11.2 IFES 11.3 DL/ECIES |
64 | 11.4 IFES-EPOC |
66 | 12. Message-encoding methods 12.1 Message-encoding methods for signatures with appendix |
73 | 12.2 Message-encoding methods for encryption |
80 | 12.3 Message-encoding methods for signatures giving message recovery |
86 | 13. Key derivation functions |
87 | 13.2 KDF2 |
88 | 14. Auxiliary techniques 14.1 Hash functions |
91 | 14.2 Mask generation functions |
92 | 14.3 Symmetric encryption schemes |
96 | 14.4 Message authentication codes |
98 | Annex A (informative) Number-theoretic algorithms A.2 Integer and modular arithmetic: algorithms |
99 | A.3 Binary finite fields: overview |
100 | A.7 Basis conversion for binary fields |
110 | A.17 Odd-characteristic extension fields |
120 | Annex B (normative) Conformance B.2 Conformance requirements |
123 | Annex C (informative) Rationale |
124 | C.3 Schemes |
126 | C.4 Additional methods |
128 | Annex D (informative) Security considerations D.1 Introduction |
129 | D.4 Family-specific considerations |
156 | Annex E (informative) Formats E.1 Overview E.2 Representing basic data types as octet strings |
158 | E.3 Representing outputs of schemes as octet strings |
160 | Annex F (informative) Information about patents |
161 | Annex G (informative) Bibliography |