• There are no items in your cart
We noticed you’re not on the correct regional site. Switch to our AMERICAS site for the best experience.
Dismiss alert

INCITS/ISO/IEC 9796-3 : 2000

Superseded
Superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

View Superseded by
superseded

A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURE SCHEMES GIVING MESSAGE RECOVERY - PART 3: DISCRETE LOGARITHM BASED MECHANISMS
Available format(s)

Hardcopy , PDF

Superseded date

20-02-2019

Language(s)

English

Published date

01-01-2005

1 Scope
2 Normative references
3 Terms and definitions
4 Symbols, conventions, and legend for figures
5 Requirements
6 Signature process
7 Verification process
8 Signature schemes giving message recovery
9 Signature scheme on a prime field
10 Signature scheme on an elliptic curve
Annex A (normative) - Validation of domain parameters
        and public keys
Annex B (informative) - Numerical examples I - Signature
        mechanisms on finite fields
Annex C (informative) - Numerical examples II - Elliptic
        curve mechanisms
Annex D (informative) - Information about patents
Bibliography

Describes two randomized digital signature schemes giving message recovery. The security of both schemes is based on the difficulty of the discrete logarithm problem.

Committee
CS1
DevelopmentNote
Supersedes INCITS/ISO/IEC 9796. (02/2003)
DocumentType
Standard
Pages
32
ProductNote
Reconfirmed 2000
PublisherName
Information Technology Industry Council
Status
Superseded
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 9796-3:2006 Identical

ISO/IEC 15946-1:2016 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General
ISO/IEC 14888-1:2008 Information technology Security techniques Digital signatures with appendix Part 1: General
ISO/IEC 15946-2:2002 Information technology Security techniques Cryptographic techniques based on elliptic curves Part 2: Digital signatures
ISO/IEC 11770-3:2015 Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques

View more information

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.