Page 175 - ISCI’2017
P. 175

[74]  Information technology. Security techniques. Hash-functions. Part 2. Hash-functions using an

                  n-bit block cipher: ISO/IEC 10118-2.
            [75]  Information technology. Security techniques. Hash-functions. Part 3. Dedicated hash-functions:

                  ISO/IEC 10118-3.
            [76]  Information technology. Security techniques. Digital  signature schemes giving  message

                  recovery. Part 3. Discrete logarithm based mechanisms: ISO/IEC 9796-3:2006.
            [77]  Information technologies. Cryptographic  information security. Digital  signature based on

                  elliptic curves. Forming and Checking: DSTU (State Standards of Ukraine) 4145-2002.



































































                                                                                                         175
   170   171   172   173   174   175   176   177   178   179   180