Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -- Amendment 2: Optimizing hash inputs— 10 стр.
Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -- Technical Corrigendum 1— 4 стр.
Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -- Technical Corrigendum 2— 2 стр.
Information technology -- Security techniques -- Digital signatures with appendix -- Part 3: Discrete logarithm based mechanisms -- Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm— 32 стр.