Information technology — Security techniques — Cryptographic techniques based on elliptic curves — P...
1 Scope
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192-4, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3 and ISO/IEC 18033-2.
This document is applicable to cryptographic…
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based cipher...
1 Scope
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mechanism the
functional interface, the precise operation of the mechanism, and the ciphertext format are specified.
However, conforming systems may use alternative formats for storing and transmitting ciphertexts.
IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption
1 Scope
This document specifies the following mechanisms for homomorphic encryption.
— Exponential ElGamal encryption;
— Paillier encryption.
For each mechanism, this document specifies the process for:
— generating parameters and the keys of the involved entities;
— encrypting data;
— decrypting encrypted data; and
— homomorphically operating on encrypted data.
Annex A defines the…
Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm...
1 Scope
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures. The variants are blind digital signature mechanisms with partial disclosure, blind digital signature mechanisms with selective disclosure and traceable blind digital signature mechanisms. The security of all the mechanisms in this part of ISO/…
Information technology — Security techniques — Blind digital signatures — Part 1: General
1 Scope
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following variants of blind digital signature mechanisms:
— blind signature mechanisms with partial disclosure;
— blind signature mechanisms with selective disclosure;
— traceable blind signature…
Programming Languages — Technical Specification for C++ Extensions for Parallelism
1 Scope [parallel.scope]
1 This document describes requirements for implementations of an interface that computer programs written
in the C++ programming language can use to invoke algorithms with parallel execution. The algorithms
described by this document are realizable across a broad class of computer architectures.
2 There is a possibility of a subset of the functionality described by…
Information technology — Biometric data interchange formats — Part 1: Framework
1 Scope
This part of ISO/IEC 19794 specifies
? general aspects for the usage of biometric data structures,
? the types of biometric data structure,
? a naming concept for biometric data structures,
? a coding scheme for format types.
Biometric data include but are not limited to finger minutiae, finger pattern, finger image, face image, iris
image and signature/sign behavioural data.
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard specifies procedures, managed objects, and protocols for bridges and end systems that provide
identification and replication of packets for redundant transmission, identification of duplicate packets, and
elimination of duplicate packets. It is not concerned with the creation of the multiple paths over which the
duplicates are transmitted.
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard defines several media independent services (MIS); handover, home energy management
system (HEMS), software-defined radio access networks (SDRANs), radio resource management (RRM),
and device-to-device (D2D) communication that shall be implemented in conjunction with the MIS
framework as defined in IEEE Std 802.21™-2017 to optimize the performance of such services.
Ergonomics of human-system interaction — Part 210: Human-centred design for interactive systems
1 Scope
This document provides requirements and recommendations for human-centred design principles and activities throughout the life cycle of computer-based interactive systems. It is intended to be used by those managing design processes, and is concerned with ways in which both hardware and software components of interactive systems can enhance human–system interaction.
NOTE Computer-based…