Language:
    • Available Formats
    • Options
    • Availability
    • Priced From ( in USD )
    • Secure PDF 🔒
    • 👥
    • Immediate download
    • $309.88
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $309.88
    • Add to Cart
    • Printed Edition + PDF
    • Immediate download
    • $417.83
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

BS ISO/IEC 15946-5:2017 specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.

This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192-4, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3 and ISO/IEC 18033-2.

This document is applicable to cryptographic techniques based on elliptic curves defined over finite fields of prime power order (including the special cases of prime order and characteristic two). This document is not applicable to the representation of elements of the underlying finite field (i.e. which basis is used).

The ISO/IEC 15946 series does not specify the implementation of the techniques it defines. Interoperability of products complying with the ISO/IEC 15946 series will not be guaranteed.


Cross References:
ISO/IEC 15946-1:2016
ISO/IEC 18033-2:2006
ISO/IEC 29192-4:2013
ISO/IEC 11770-3:1999
ISO/IEC 14888-3:2016
ISO/IEC 18032:2005 Ed 1
ISO/IEC 9796-3:2006
FIPS. 186-2
IEEE P1363-2000
ISO/IEC 10118 (All Parts)


All current amendments available at time of purchase are included with the purchase of this document.
 

Document History

  1. BS ISO/IEC 15946-5:2022


    Information security. Cryptographic techniques based on elliptic curves-Elliptic curve generation

    • Most Recent
  2. BS ISO/IEC 15946-5:2017

    👀 currently
    viewing


    Information technology. Security techniques. Cryptographic techniques based on elliptic curves-Elliptic curve generation

    • Historical Version
  3. BS ISO/IEC 15946-5:2009


    Information technology. Security techniques. Cryptographic techniques based on elliptic curves-Elliptic curve generation

    • Historical Version