()
.
* . , , , i=0,..., , .
.1 1
-
.1.1 - 512
:
;
;
.
, :
.
S:
:
1
2
3
4
5
6
7
8
9
10
11
12
13
:
:
:
:
-
A.1.2 - 256
:
;
;
.
, :
.
:
:
:
1
2
3
4
5
6
7
8
9
10
11
12
13
:
:
:
:
- :
A.2 2
-
.2.1 - 512
:
;
;
.
,
.
:
:
:
:
1
2
3
4
5
6
7
8
9
10
11
12
13
:
:
512, .
|
|
:
:
:
:
- :
A.2.2 - 256
:
;
;
.
,
.
:
:
:
:
1
2
3
4
5
6
7
8
9
10
11
12
13
:
:
512, :
:
:
:
:
- :
_______________
* / "" .
[1] | 2382-2:1976 (ISO 2382-2:1976) | . . 2. (Data processing - Vocabulary - Part 2: Arithmetic and logic operations) |
[2] | / 9796-2:2010 (ISO/IEC 9796-2:2010) | . . , . 2. (Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms) |
[3] | / 9796-3:2006 (ISO/IEC 9796-3:2006) | . . , . 3. (Information technology - Security techniques - Digital signature schemes giving message recovery - Part 3: Discrete logarithm based mechanisms) |
[4] | / 14888-1:2008 (ISO/IEC 14888-1:2008) | . . . 1. (Information technology - Security techniques - Digital signatures with appendix - Part 1: General) |
[5] | / 14888-2:2008 (ISO/IEC 14888-2:2008) | . . . 2. , (Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms) |
[6] | / 14888-3:2006 (ISO/IEC 14888-3:2006) | . . . 3. (Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms) |
[7] | / 14888-3:2006/. 1:2010 (ISO/IEC 14888-3:2006/Amd 1:2010) | . . . 3. . 1. , , , (Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms. Amendment 1. Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm) |
[8] | / 10118-1:2000 (ISO/IEC 10118-1:2000) | . . -. 1. (Information technology - Security techniques - Hash-functions - Part 1: General) |
[9] | / 10118-2:2010 (ISO/IEC 10118-2:2010) | . . -. 2. - - (Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an -bit block cipher) |
[10] | / 10118-3:2004 (ISO/IEC 10118-3:2004) | . . -. 3. - (Information technology - Security techniques - Hash-functions - Part 3: Dedicated hash-functions) |
[11] | / 10118-4:1998 (ISO/IEC 10118-4:1998) | . . -. 4. - (Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic) |
|
|
"" :
.: , 2013