.


:




:

































 

 

 

 


().




()

.
* . , , , i=0,..., , .

 

.1 1
-

.1.1 - 512
:


;

;

.

, :

.
S:

 


:

1

 


2

 


3

 


4

 


5

 

6

 


7

 


8

 


9

 


10

 


11

 


12

 


13

 


:

 


:

 


:

 


:

 


-

 

A.1.2 - 256

:

 

;


;


.


, :

 


.

:

 


:


:

1

 


2

 

3

 


4

 


5

 


6

 


7

 


8

 


9

 


10

 


11

 


12

 


13

 


:

 


:

 


:

 


:

 


- :

 

A.2 2

-

 

.2.1 - 512

:

 

;


;


.


,

 


.

:

 


:

 


:

 


:

1

 


2

 


3

 


4

 


5

 


6

 


7

 


8

 


9

 


10

 


11

 


12

 


13

 


:

 


:

 


512, .

 


:

 


:

 


:

 


:

 


- :

 

A.2.2 - 256

:

 

;


;


.

 

,

 


.

:

 

:

 


:

 


:

1

 


2

 


3

 


4

 


5

 


6

 


7

 


8

 


9

 


10

 


11

 


12

 


13

 


:

 


:

 


512, :

 


:

 


:

 


:

 


:

 


- :

 

 

_______________
* / "" .


     
[1] 2382-2:1976 (ISO 2382-2:1976) . . 2. (Data processing - Vocabulary - Part 2: Arithmetic and logic operations)
[2] / 9796-2:2010 (ISO/IEC 9796-2:2010) . . , . 2. (Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms)
[3] / 9796-3:2006 (ISO/IEC 9796-3:2006) . . , . 3. (Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms)
[4] / 14888-1:2008 (ISO/IEC 14888-1:2008) . . . 1. (Information technology - Security techniques - Digital signatures with appendix - Part 1: General)
[5] / 14888-2:2008 (ISO/IEC 14888-2:2008) . . . 2. , (Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms)
[6] / 14888-3:2006 (ISO/IEC 14888-3:2006) . . . 3. (Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms)
[7] / 14888-3:2006/. 1:2010 (ISO/IEC 14888-3:2006/Amd 1:2010) . . . 3. . 1. , , , (Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms. Amendment 1. Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm)
[8] / 10118-1:2000 (ISO/IEC 10118-1:2000) . . -. 1. (Information technology - Security techniques - Hash-functions - Part 1: General)
[9] / 10118-2:2010 (ISO/IEC 10118-2:2010) . . -. 2. - - (Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an -bit block cipher)
[10] / 10118-3:2004 (ISO/IEC 10118-3:2004) . . -. 3. - (Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions)
[11] / 10118-4:1998 (ISO/IEC 10118-4:1998) . . -. 4. - (Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic)

 



"" :

.: , 2013






:


: 2016-12-18; !; : 269 |


:

:

, , .
==> ...

2065 - | 1704 -


© 2015-2024 lektsii.org - -

: 0.128 .