Inactive-Reserved Standard

IEEE 1363a-2004

IEEE Standard Specifications for Public-Key Cryptography - Amendment 1: Additional Techniques

Amendment to IEEE Std 1363-2000, this standard specifies additional public-key cryptographic techniques beyond those in IEEE Std 1363-2000. It is intended to be merged with IEEE Std 1363-2000 during future revisions.

Sponsor Committee
C/MSC - Microprocessor Standards Committee
Learn More About C/MSC - Microprocessor Standards Committee
Status
Inactive-Reserved Standard
PAR Approval
2001-09-27
Board Approval
2004-03-25
History
ANSI Approved:
2004-07-22
Published:
2004-09-02
Inactivated Date:
2019-11-07

Working Group Details

Society
IEEE Computer Society
Learn More About IEEE Computer Society
Sponsor Committee
C/MSC - Microprocessor Standards Committee
Learn More About C/MSC - Microprocessor Standards Committee
Working Group
1363_WG - Working Group for Public-Key Cryptographic
IEEE Program Manager
Tom Thompson
Contact Tom Thompson
Working Group Chair
William Whyte

Other Activities From This Working Group

Current projects that have been authorized by the IEEE SA Standards Board to develop a standard.


No Active Projects

Standards approved by the IEEE SA Standards Board that are within the 10-year lifecycle.


1363.3-2013

IEEE Standard for Identity-Based Cryptographic Techniques using Pairings

Common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, as well as cryptographic schemes based on those primitives are specified in this standard. Also, related cryptographic parameters, public keys and private keys, are specified. The purpose of this standard is to provide a reference for specifications of a variety of techniques from which applications may select.

Learn More About 1363.3-2013

These standards have been replaced with a revised version of the standard, or by a compilation of the original active standard and all its existing amendments, corrigenda, and errata.


No Superseded Standards

These standards have been removed from active status through a ballot where the standard is made inactive as a consensus decision of a balloting group.


No Inactive-Withdrawn Standards

These standards are removed from active status through an administrative process for standards that have not undergone a revision process within 10 years.


1363-2000

IEEE Standard Specifications for Public-Key Cryptography

This standard specifies common public-key cryptographic techniques, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, and cryptographic schemes based on those primitives. It also specifies related cryptographic parameters, public keys, and private keys. The purpose of this standard is to provide a reference for specifications on a variety of techniques from which applications may select.

Learn More About 1363-2000

1363.1-2008

IEEE Standard Specification for Public Key Cryptographic Techniques Based on Hard Problems over Lattices

Specifications of common public-key cryptographic techniques based on hard problems over lattices supplemental to those considered in IEEE 1363 and IEEE P1363a, including mathematical primitives for secret value (key) derivation, public-key encryption, identification and digital signatures, and cryptographic schemes based on those primitives. Specifications of related cryptographic parameters, public keys and private keys. Class of computer and communications systems is not restricted.

Learn More About 1363.1-2008

1363.2-2008

IEEE Standard Specification for Password-Based Public-Key Cryptographic Techniques

This standard covers specifications of public-key cryptographic techniques for password-based authentication and key establishment, supplemental to the techniques described in IEEE Std 1363-2000 and IEEE Std 1363a-2004. It is intended as a companion standard to IEEE Std 1363-2000 and IEEE Std 1363a-2004. It includes specifications of primitives and schemes designed to utilize passwords and other low-grade secrets as a basis for securing electronic transactions, including schemes for password-authenticated key agreement and password-authenticated key retrieval.

Learn More About 1363.2-2008

Subscribe

Sign up for our monthly newsletter to learn about new developments, including resources, insights and more.