ISO/IEC 14888-3:2006/AMD2:2012
Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 2: Optimizing hash inputs
OVERVIEW
COMMENTS
-
PRODUCT DETAILS
| Status | Withdrawn - 05 Jan 2026 |
|---|---|
| Edition | 2012 |
| No. of Pages | 4 |
| ICS Classification | 35.030 IT Security |
| Committee | ISO/IEC JTC 1/SC 27 |
| Available for Purchase | For sale in Singapore only |
| Adoption | IEC : 0 |