{"id":396404,"date":"2024-10-20T04:24:29","date_gmt":"2024-10-20T04:24:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/ieee-1363a-2004-2\/"},"modified":"2024-10-26T08:11:52","modified_gmt":"2024-10-26T08:11:52","slug":"ieee-1363a-2004-2","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/ieee\/ieee-1363a-2004-2\/","title":{"rendered":"IEEE 1363a-2004"},"content":{"rendered":"

Amendment Standard – Inactive-Reserved. Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nTitle Page <\/td>\n<\/tr>\n
4<\/td>\nIntroduction <\/td>\n<\/tr>\n
5<\/td>\nNotice to users
Errata
Interpretations
Patents
Organization <\/td>\n<\/tr>\n
6<\/td>\nParticipants <\/td>\n<\/tr>\n
8<\/td>\nCONTENTS <\/td>\n<\/tr>\n
10<\/td>\nEditor’s Note <\/td>\n<\/tr>\n
11<\/td>\n1. Overview
1.1 Scope
1.2 Purpose
2. References <\/td>\n<\/tr>\n
12<\/td>\n3. Definitions <\/td>\n<\/tr>\n
13<\/td>\n4. Types of cryptographic techniques
4.2 Primitives
4.3 Schemes
4.4 Additional methods <\/td>\n<\/tr>\n
14<\/td>\n4.5 Table summary <\/td>\n<\/tr>\n
16<\/td>\n5. Mathematical conventions
5.1 Mathematical notation <\/td>\n<\/tr>\n
18<\/td>\n5.4 Elliptic curves and points
5.5 Data type conversion <\/td>\n<\/tr>\n
24<\/td>\n6. Primitives based on the discrete logarithm problem
6.2 Primitives <\/td>\n<\/tr>\n
30<\/td>\n7. Primitives based on the elliptic curve discrete logarithm problem
7.2 Primitives <\/td>\n<\/tr>\n
35<\/td>\n8. Primitives based on the integer factorization problem <\/td>\n<\/tr>\n
37<\/td>\n8.2 Primitives <\/td>\n<\/tr>\n
42<\/td>\n9. Key agreement schemes
9.2 DL\/ECKAS-DH1 <\/td>\n<\/tr>\n
43<\/td>\n9.3 DL\/ECKAS-DH2 <\/td>\n<\/tr>\n
44<\/td>\n9.4 DL\/ECKAS-MQV <\/td>\n<\/tr>\n
45<\/td>\n10. Signature schemes
10.1 General model <\/td>\n<\/tr>\n
47<\/td>\n10.2 DL\/ECSSA <\/td>\n<\/tr>\n
48<\/td>\n10.3 IFSSA <\/td>\n<\/tr>\n
50<\/td>\n10.4 DL\/ECSSR <\/td>\n<\/tr>\n
52<\/td>\n10.5 DL\/ECSSR-PV <\/td>\n<\/tr>\n
55<\/td>\n10.6 IFSSR <\/td>\n<\/tr>\n
57<\/td>\n11. Encryption schemes
11.1 General model <\/td>\n<\/tr>\n
59<\/td>\n11.2 IFES
11.3 DL\/ECIES <\/td>\n<\/tr>\n
64<\/td>\n11.4 IFES-EPOC <\/td>\n<\/tr>\n
66<\/td>\n12. Message-encoding methods
12.1 Message-encoding methods for signatures with appendix <\/td>\n<\/tr>\n
73<\/td>\n12.2 Message-encoding methods for encryption <\/td>\n<\/tr>\n
80<\/td>\n12.3 Message-encoding methods for signatures giving message recovery <\/td>\n<\/tr>\n
86<\/td>\n13. Key derivation functions <\/td>\n<\/tr>\n
87<\/td>\n13.2 KDF2 <\/td>\n<\/tr>\n
88<\/td>\n14. Auxiliary techniques
14.1 Hash functions <\/td>\n<\/tr>\n
91<\/td>\n14.2 Mask generation functions <\/td>\n<\/tr>\n
92<\/td>\n14.3 Symmetric encryption schemes <\/td>\n<\/tr>\n
96<\/td>\n14.4 Message authentication codes <\/td>\n<\/tr>\n
98<\/td>\nAnnex A (informative) Number-theoretic algorithms
A.2 Integer and modular arithmetic: algorithms <\/td>\n<\/tr>\n
99<\/td>\nA.3 Binary finite fields: overview <\/td>\n<\/tr>\n
100<\/td>\nA.7 Basis conversion for binary fields <\/td>\n<\/tr>\n
110<\/td>\nA.17 Odd-characteristic extension fields <\/td>\n<\/tr>\n
120<\/td>\nAnnex B (normative) Conformance
B.2 Conformance requirements <\/td>\n<\/tr>\n
123<\/td>\nAnnex C (informative) Rationale <\/td>\n<\/tr>\n
124<\/td>\nC.3 Schemes <\/td>\n<\/tr>\n
126<\/td>\nC.4 Additional methods <\/td>\n<\/tr>\n
128<\/td>\nAnnex D (informative) Security considerations
D.1 Introduction <\/td>\n<\/tr>\n
129<\/td>\nD.4 Family-specific considerations <\/td>\n<\/tr>\n
156<\/td>\nAnnex E (informative) Formats
E.1 Overview
E.2 Representing basic data types as octet strings <\/td>\n<\/tr>\n
158<\/td>\nE.3 Representing outputs of schemes as octet strings <\/td>\n<\/tr>\n
160<\/td>\nAnnex F (informative) Information about patents <\/td>\n<\/tr>\n
161<\/td>\nAnnex G (informative) Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

IEEE Standard Specifications for Public-Key Cryptography – Amendment 1: Additional Techniques<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
IEEE<\/b><\/a><\/td>\n2004<\/td>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":396409,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2644],"product_tag":[],"class_list":{"0":"post-396404","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ieee","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/396404","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/396409"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=396404"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=396404"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=396404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}