Information technology — Automatic identification and data capture techniques — Syntax for high-capa...
1 Scope
This document specifies a transfer structure, syntax, and coding of messages and data formats when using high-capacity ADC media between trading partners (specifically between suppliers and recipients) and, where applicable, in support of carrier applications, such as bills of lading, and carrier sortation and tracking.
The data encoded according to this document include:
— data which…
Information technology — Automatic identification and data capture techniques — Unique identificatio...
1 Scope
This part of ISO/IEC 15459 specifies a unique string of characters for the identification of individual products and product packages. The character string is intended to be represented in a linear bar code symbol or two-dimensional symbol or other AIDC media attached to the entity to meet management needs. To address management needs different classes of identities are recognized in the…
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — P...
1 Scope
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192-4, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3 and ISO/IEC 18033-2.
This document is applicable to cryptographic…
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based cipher...
1 Scope
This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mechanism the
functional interface, the precise operation of the mechanism, and the ciphertext format are specified.
However, conforming systems may use alternative formats for storing and transmitting ciphertexts.
IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption
1 Scope
This document specifies the following mechanisms for homomorphic encryption.
— Exponential ElGamal encryption;
— Paillier encryption.
For each mechanism, this document specifies the process for:
— generating parameters and the keys of the involved entities;
— encrypting data;
— decrypting encrypted data; and
— homomorphically operating on encrypted data.
Annex A defines the…
Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm...
1 Scope
This part of ISO/IEC 18370 specifies blind digital signature mechanisms, together with mechanisms for three variants of blind digital signatures. The variants are blind digital signature mechanisms with partial disclosure, blind digital signature mechanisms with selective disclosure and traceable blind digital signature mechanisms. The security of all the mechanisms in this part of ISO/…
Information technology — Security techniques — Blind digital signatures — Part 1: General
1 Scope
This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following variants of blind digital signature mechanisms:
— blind signature mechanisms with partial disclosure;
— blind signature mechanisms with selective disclosure;
— traceable blind signature…
Programming Languages — Technical Specification for C++ Extensions for Parallelism
1 Scope [parallel.scope]
1 This document describes requirements for implementations of an interface that computer programs written
in the C++ programming language can use to invoke algorithms with parallel execution. The algorithms
described by this document are realizable across a broad class of computer architectures.
2 There is a possibility of a subset of the functionality described by…
Information technology — Biometric data interchange formats — Part 1: Framework
1 Scope
This part of ISO/IEC 19794 specifies
? general aspects for the usage of biometric data structures,
? the types of biometric data structure,
? a naming concept for biometric data structures,
? a coding scheme for format types.
Biometric data include but are not limited to finger minutiae, finger pattern, finger image, face image, iris
image and signature/sign behavioural data.
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard specifies procedures, managed objects, and protocols for bridges and end systems that provide
identification and replication of packets for redundant transmission, identification of duplicate packets, and
elimination of duplicate packets. It is not concerned with the creation of the multiple paths over which the
duplicates are transmitted.