해외표준 상세정보
관심표준 등록 : 표준업데이트 시 알림서비스
제공형태 더보기-
폐지
판매
CAN/CSA-ISO/IEC 14888-3:18
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2016, third edition, 2016-03-15)- 발행일 : 2018-01-01
- 발행기관 : CSA
상세정보
분야 | |
---|---|
적용범위 | Preface Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).? For brevity, this Standard will be referred to as "CAN/CSA-ISO/IEC 14888-3" throughout.? This Standard supersedes CAN/CSA-ISO/IEC 14888-3:07 (adopted ISO/IEC 14888-3:2006).? Scope This part of ISO/IEC 14888 specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem.? This part of ISO/IEC 14888 provides:? a general description of a digital signature with appendix mechanism, and? a variety of mechanisms that provide digital signatures with appendix.? For each mechanism, this part of ISO/IEC 14888 specifies:? the process of generating a pair of keys? the process of producing signatures, and? the process of verifying signatures. |
국제분류(ICS)코드 | |
페이지수 | 150 |
Edition |
이력정보
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | CSA ISO/IEC 14888-3:19상세보기 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2018, fourth edition, 2018-11) | 2019-01-01 | 표준 |
2 | ISO/IEC 14888-3:2018상세보기 | IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2018-11-12 | 표준 |
3 | ISO/IEC 14888-3:2018상세보기 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2018-11-12 | 표준 |
4 | CAN/CSA-ISO/IEC 14888-3:18상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2016, third edition, 2016-03-15) | 2018-01-01 | 폐지 |
5 | ISO/IEC 14888-3:2016상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2016-03-17 | 구판 |
6 | ISO/IEC 14888-3:2016상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2016-03-17 | 구판 |
7 | ISO/IEC 14888-3:2006/AMD2:2012상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 2: Optimizing hash inputs | 2012-06-27 | 구판 |
8 | ISO/IEC 14888-3:2006/Amd 2:2012상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | 2012-06-27 | 구판 |
9 | ISO/IEC 14888-3:2006/AMD1:2010상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | 2010-06-04 | 구판 |
10 | ISO/IEC 14888-3:2006/Amd 1:2010상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | 2010-06-04 | 구판 |
11 | ISO/IEC 14888-3:2006/COR2:2009상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 2 | 2009-02-16 | 구판 |
12 | ISO/IEC 14888-3:2006/Cor 2:2009상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2 | 2009-02-16 | 구판 |
13 | ISO/IEC 14888-3:2006/COR1:2007상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 1 | 2007-08-16 | 구판 |
14 | ISO/IEC 14888-3:2006/Cor 1:2007상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | 2007-08-16 | 구판 |
15 | ISO/IEC 14888-3:2006상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2006-11-13 | 구판 |
16 | ISO/IEC 14888-3:2006상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2006-11-13 | 구판 |
17 | ISO/IEC 14888-3:1998/Cor 1:2001상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1 | 2001-10-04 | 구판 |
18 | ISO/IEC 14888-3:1998/COR1:2001상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Technical Corrigendum 1 | 2001-10-04 | 구판 |
19 | ISO/IEC 14888-3:1998상세보기 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms | 1998-12-20 | 구판 |
20 | ISO/IEC 14888-3:1998상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | 1998-12-20 | 구판 |
21 | ISO/IEC 14888-3:2016/DAmd 1상세보기 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism | 폐지 |
관련상품
- ISO/IEC 14888-3:2016/DAmd 1 - Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: SM2 digital signature mechanism
- ISO/IEC 14888-1:2008 - Information technology - Security techniques - Digital signatures with appendix - Part 1: General
- ISO/IEC 14888-1:2008 - Information technology — Security techniques — Digital signatures with appendix — Part 1: General
- ISO/IEC 14888-2:2008 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms
- ISO/IEC 14888-2:2008 - Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms
다른 사람이 함께 구입한 상품
- 함께 구입한 상품이 존재하지 않습니다.
추천 상품
- IEC TS 63134:2020 - Active assisted living (AAL) use cases
- IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification
- KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs)
- KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs)
- KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스
제공형태 닫기
PDF :
직접 파일 다운로드 및 인쇄(마이페이지 확인)보안PDF :
직접 파일 다운로드 및 인쇄(마이페이지 확인)* 단, 파일이동 및 복사 불가, 1회 다운로드 및 인쇄가능PRINT :
인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)BOOK :
인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)ZIP :
압축파일형태로 제공 (PDF, HTML, TXT, XLS 등으로 구성), 직접 파일 다운로드(마이페이지 확인)CD/DVD :
직접 파일 다운로드 및 인쇄(마이페이지 확인)DB :
별도 정보 제공HARDCOPY :
해외 배송 상품, 최대 3주 소요바인더 :
바인더 우편발송, 2~3일 소요온라인구독 :
WEB 접속 후 실시간 열람, 출력(1년간)