{"id":394455,"date":"2024-10-20T04:14:07","date_gmt":"2024-10-20T04:14:07","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-15946-52022\/"},"modified":"2024-10-26T07:55:14","modified_gmt":"2024-10-26T07:55:14","slug":"bs-iso-iec-15946-52022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-15946-52022\/","title":{"rendered":"BS ISO\/IEC 15946-5:2022"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Symbols and conversion functions 4.1 Symbols <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Conversion functions 5 Conventions for elliptic curves 5.1 Definitions of elliptic curves 5.1.1 Elliptic curves over F(pm) <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.1.2 Elliptic curves over F(2m) 5.1.3 Elliptic curves over F(3m) 5.2 Group law on elliptic curves <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 6 Framework for elliptic curve generation 6.1 Trust in elliptic curve 6.2 Overview of elliptic curve generation 7 Verifiably pseudo-random elliptic curve generation 7.1 General 7.2 Constructing verifiably pseudo-random elliptic curves (prime case) 7.2.1 Construction algorithm <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 7.2.2 Test for near primality 7.2.3 Finding a point of large prime order 7.2.4 Verification of elliptic curve pseudo-randomness <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3 Constructing verifiably pseudo-random elliptic curves (binary case) 7.3.1 Construction algorithm <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.3.2 Verification of elliptic curve pseudo-randomness <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 8 Constructing elliptic curves by complex multiplication 8.1 General 8.2 Barreto-Naehrig (BN) curve <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.3 Barreto-Lynn-Scott (BLS) curve <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 9 Constructing elliptic curves by lifting <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | Annex A (informative) Background information on elliptic curves <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | Annex B (informative) Background information on elliptic curve cryptosystems <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | Annex C (informative) Background information on constructing elliptic curves by complex multiplication <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Annex D (informative) Numerical examples <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Annex E (informative) Summary of properties of elliptic curves generated by the complex multiplication method <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information security. Cryptographic techniques based on elliptic curves – Elliptic curve generation<\/b><\/p>\n |