Information technology -- Security techniques -- Cryptographic techniques based on elliptic curves -- Part 1: General -- Technical Corrigendum 2— 2 стр.
Information technology -- Security techniques -- Cryptographic techniques based on elliptic curves -- Part 1: General -- Technical Corrigendum 1— 1 стр.