BS ISO/IEC 29150:2011
Current
The latest, up-to-date edition.
Information technology. Security techniques. Signcryption
Hardcopy , PDF
English
30-04-2014
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notations
5 Finite fields and elliptic curves
6 Conversion functions
7 Cryptographic transformations
8 General model for signcryption
9 Discrete logarithm based signcryption mechanism (DLSC)
10 Elliptic curve based signcryption mechanism (ECDLSC)
11 Integer factorization based signcryption mechanism (IFSC)
12 Encrypt-then-sign-based mechanism (EtS)
Annex A (normative) - Object identifiers
Annex B (informative) - Security considerations
Annex C (informative) - Guidance on use of the mechanisms
Annex D (informative) - Examples
Bibliography
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.