BS ISO/IEC 15946-5:2022
$167.15
Information security. Cryptographic techniques based on elliptic curves – Elliptic curve generation
Published By | Publication Date | Number of Pages |
BSI | 2022 | 44 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | National foreword |
6 | Foreword |
7 | Introduction |
9 | 1 Scope 2 Normative references 3 Terms and definitions |
10 | 4 Symbols and conversion functions 4.1 Symbols |
11 | 4.2 Conversion functions 5 Conventions for elliptic curves 5.1 Definitions of elliptic curves 5.1.1 Elliptic curves over F(pm) |
12 | 5.1.2 Elliptic curves over F(2m) 5.1.3 Elliptic curves over F(3m) 5.2 Group law on elliptic curves |
13 | 6 Framework for elliptic curve generation 6.1 Trust in elliptic curve 6.2 Overview of elliptic curve generation 7 Verifiably pseudo-random elliptic curve generation 7.1 General 7.2 Constructing verifiably pseudo-random elliptic curves (prime case) 7.2.1 Construction algorithm |
15 | 7.2.2 Test for near primality 7.2.3 Finding a point of large prime order 7.2.4 Verification of elliptic curve pseudo-randomness |
16 | 7.3 Constructing verifiably pseudo-random elliptic curves (binary case) 7.3.1 Construction algorithm |
17 | 7.3.2 Verification of elliptic curve pseudo-randomness |
18 | 8 Constructing elliptic curves by complex multiplication 8.1 General 8.2 Barreto-Naehrig (BN) curve |
19 | 8.3 Barreto-Lynn-Scott (BLS) curve |
20 | 9 Constructing elliptic curves by lifting |
22 | Annex A (informative) Background information on elliptic curves |
24 | Annex B (informative) Background information on elliptic curve cryptosystems |
27 | Annex C (informative) Background information on constructing elliptic curves by complex multiplication |
32 | Annex D (informative) Numerical examples |
40 | Annex E (informative) Summary of properties of elliptic curves generated by the complex multiplication method |
41 | Bibliography |