Page 175 - ISCI’2017
P. 175
[74] Information technology. Security techniques. Hash-functions. Part 2. Hash-functions using an
n-bit block cipher: ISO/IEC 10118-2.
[75] Information technology. Security techniques. Hash-functions. Part 3. Dedicated hash-functions:
ISO/IEC 10118-3.
[76] Information technology. Security techniques. Digital signature schemes giving message
recovery. Part 3. Discrete logarithm based mechanisms: ISO/IEC 9796-3:2006.
[77] Information technologies. Cryptographic information security. Digital signature based on
elliptic curves. Forming and Checking: DSTU (State Standards of Ukraine) 4145-2002.
175