Loading [a11y]/accessibility-menu.js
1363a-2004 - IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques | IEEE Standard | IEEE Xplore

1363a-2004 - IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Status: inactive - Reserved
Versions

Abstract:

Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged wi...Show More
Scope:Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (k...Show More
Purpose:The transition from paper to electronic media brings with it the need for electronic privacy and authenticity. Public-key cryptography offers fundamental technology addre...Show More

Abstract:

Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.
Scope:
Specifications of common public-key cryptographic techniques supplemental to those considered in IEEE Std 1363-2000, including mathematical primitives for secret value (key) derivation, public-key encryption, digital signatures, and identification, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.
Purpose:
The transition from paper to electronic media brings with it the need for electronic privacy and authenticity. Public-key cryptography offers fundamental technology addressing this need. Many alternative public-key techniques have been proposed, each with its own benefits. However, there has been no single, comprehensive reference defining a full range of common public-key techniques covering key agreement, public-key encryption, digital signatures, and identification from several families, such as discrete logarithms, integer factorization, and elliptic curves. It is not the purpose of this project to mandate any particular set of public-key techniques, or ...
Date of Publication: 02 September 2004
Electronic ISBN:978-0-7381-4004-9
Persistent Link: https://ieeexplore.ieee.org/servlet/opac?punumber=9276

Subscription Options - Standards

References

References is not available for this document.