%PDF-1.4 5 0 obj << /S /GoTo /D (section.1) >> endobj 8 0 obj (Introduction) endobj 9 0 obj << /S /GoTo /D (subsection.1.1) >> endobj 12 0 obj (Overview) endobj 13 0 obj << /S /GoTo /D (subsection.1.2) >> endobj 16 0 obj (Aim) endobj 17 0 obj << /S /GoTo /D (subsection.1.3) >> endobj 20 0 obj (Compliance) endobj 21 0 obj << /S /GoTo /D (subsection.1.4) >> endobj 24 0 obj (Document Evolution) endobj 25 0 obj << /S /GoTo /D (subsection.1.5) >> endobj 28 0 obj (Intellectual Property) endobj 29 0 obj << /S /GoTo /D (subsection.1.6) >> endobj 32 0 obj (Organization) endobj 33 0 obj << /S /GoTo /D (section.2) >> endobj 36 0 obj (Mathematical Foundations) endobj 37 0 obj << /S /GoTo /D (subsection.2.1) >> endobj 40 0 obj (Finite Fields) endobj 41 0 obj << /S /GoTo /D (subsubsection.2.1.1) >> endobj 44 0 obj (The Finite Field Fp) endobj 45 0 obj << /S /GoTo /D (subsubsection.2.1.2) >> endobj 48 0 obj (The Finite Field F2m) endobj 49 0 obj << /S /GoTo /D (subsection.2.2) >> endobj 52 0 obj (Elliptic Curves) endobj 53 0 obj << /S /GoTo /D (subsubsection.2.2.1) >> endobj 56 0 obj (Elliptic Curves over Fp) endobj 57 0 obj << /S /GoTo /D (subsubsection.2.2.2) >> endobj 60 0 obj (Elliptic Curves over F2m) endobj 61 0 obj << /S /GoTo /D (subsection.2.3) >> endobj 64 0 obj (Data Types and Conversions) endobj 65 0 obj << /S /GoTo /D (subsubsection.2.3.1) >> endobj 68 0 obj (Bit-String-to-Octet-String Conversion) endobj 69 0 obj << /S /GoTo /D (subsubsection.2.3.2) >> endobj 72 0 obj (Octet-String-to-Bit-String Conversion) endobj 73 0 obj << /S /GoTo /D (subsubsection.2.3.3) >> endobj 76 0 obj (Elliptic-Curve-Point-to-Octet-String Conversion) endobj 77 0 obj << /S /GoTo /D (subsubsection.2.3.4) >> endobj 80 0 obj (Octet-String-to-Elliptic-Curve-Point Conversion) endobj 81 0 obj << /S /GoTo /D (subsubsection.2.3.5) >> endobj 84 0 obj (Field-Element-to-Octet-String Conversion) endobj 85 0 obj << /S /GoTo /D (subsubsection.2.3.6) >> endobj 88 0 obj (Octet-String-to-Field-Element Conversion) endobj 89 0 obj << /S /GoTo /D (subsubsection.2.3.7) >> endobj 92 0 obj (Integer-to-Octet-String Conversion) endobj 93 0 obj << /S /GoTo /D (subsubsection.2.3.8) >> endobj 96 0 obj (Octet-String-to-Integer Conversion) endobj 97 0 obj << /S /GoTo /D (subsubsection.2.3.9) >> endobj 100 0 obj (Field-Element-to-Integer Conversion) endobj 101 0 obj << /S /GoTo /D (section.3) >> endobj 104 0 obj (Cryptographic Components) endobj 105 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 108 0 obj (Elliptic Curve Domain Parameters) endobj 109 0 obj << /S /GoTo /D (subsubsection.3.1.1) >> endobj 112 0 obj (Elliptic Curve Domain Parameters over Fp) endobj 113 0 obj << /S /GoTo /D (subsubsection.3.1.2) >> endobj 116 0 obj (Elliptic Curve Domain Parameters over F2m) endobj 117 0 obj << /S /GoTo /D (subsubsection.3.1.3) >> endobj 120 0 obj (Verifiably Random Curves and Base Point Generators) endobj 121 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 124 0 obj (Elliptic Curve Key Pairs) endobj 125 0 obj << /S /GoTo /D (subsubsection.3.2.1) >> endobj 128 0 obj (Elliptic Curve Key Pair Generation Primitive) endobj 129 0 obj << /S /GoTo /D (subsubsection.3.2.2) >> endobj 132 0 obj (Validation of Elliptic Curve Public Keys) endobj 133 0 obj << /S /GoTo /D (subsubsection.3.2.3) >> endobj 136 0 obj (Partial Validation of Elliptic Curve Public Keys) endobj 137 0 obj << /S /GoTo /D (subsubsection.3.2.4) >> endobj 140 0 obj (Verifiable and Assisted Key Pair Generation and Validation) endobj 141 0 obj << /S /GoTo /D (subsection.3.3) >> endobj 144 0 obj (Elliptic Curve Diffie-Hellman Primitives) endobj 145 0 obj << /S /GoTo /D (subsubsection.3.3.1) >> endobj 148 0 obj (Elliptic Curve Diffie-Hellman Primitive) endobj 149 0 obj << /S /GoTo /D (subsubsection.3.3.2) >> endobj 152 0 obj (Elliptic Curve Cofactor Diffie-Hellman Primitive) endobj 153 0 obj << /S /GoTo /D (subsection.3.4) >> endobj 156 0 obj (Elliptic Curve MQV Primitive) endobj 157 0 obj << /S /GoTo /D (subsection.3.5) >> endobj 160 0 obj (Hash Functions) endobj 161 0 obj << /S /GoTo /D (subsection.3.6) >> endobj 164 0 obj (Key Derivation Functions) endobj 165 0 obj << /S /GoTo /D (subsubsection.3.6.1) >> endobj 168 0 obj (ANS X9.63 Key Derivation Function) endobj 169 0 obj << /S /GoTo /D (subsection.3.7) >> endobj 172 0 obj (MAC schemes) endobj 173 0 obj << /S /GoTo /D (subsubsection.3.7.1) >> endobj 176 0 obj (Scheme Setup) endobj 177 0 obj << /S /GoTo /D (subsubsection.3.7.2) >> endobj 180 0 obj (Key Deployment) endobj 181 0 obj << /S /GoTo /D (subsubsection.3.7.3) >> endobj 184 0 obj (Tagging Operation) endobj 185 0 obj << /S /GoTo /D (subsubsection.3.7.4) >> endobj 188 0 obj (Tag Checking Operation) endobj 189 0 obj << /S /GoTo /D (subsection.3.8) >> endobj 192 0 obj (Symmetric Encryption Schemes) endobj 193 0 obj << /S /GoTo /D (subsubsection.3.8.1) >> endobj 196 0 obj (Scheme Setup) endobj 197 0 obj << /S /GoTo /D (subsubsection.3.8.2) >> endobj 200 0 obj (Key Deployment) endobj 201 0 obj << /S /GoTo /D (subsubsection.3.8.3) >> endobj 204 0 obj (Encryption Operation) endobj 205 0 obj << /S /GoTo /D (subsubsection.3.8.4) >> endobj 208 0 obj (Decryption Operation) endobj 209 0 obj << /S /GoTo /D (subsection.3.9) >> endobj 212 0 obj (Key Wrap Schemes) endobj 213 0 obj << /S /GoTo /D (subsubsection.3.9.1) >> endobj 216 0 obj (Key Wrap Scheme Setup) endobj 217 0 obj << /S /GoTo /D (subsubsection.3.9.2) >> endobj 220 0 obj (Key Wrap Schemes Key Generation) endobj 221 0 obj << /S /GoTo /D (subsubsection.3.9.3) >> endobj 224 0 obj (Key Wrap Schemes Wrap Operation) endobj 225 0 obj << /S /GoTo /D (subsubsection.3.9.4) >> endobj 228 0 obj (Key Wrap Schemes Unwrap Operation) endobj 229 0 obj << /S /GoTo /D (subsection.3.10) >> endobj 232 0 obj (Random Number Generation) endobj 233 0 obj << /S /GoTo /D (subsubsection.3.10.1) >> endobj 236 0 obj (Entropy) endobj 237 0 obj << /S /GoTo /D (subsubsection.3.10.2) >> endobj 240 0 obj (Deterministic Generation of Pseudorandom Bit Strings) endobj 241 0 obj << /S /GoTo /D (subsubsection.3.10.3) >> endobj 244 0 obj (Converting Random Bit Strings to Random Numbers) endobj 245 0 obj << /S /GoTo /D (subsection.3.11) >> endobj 248 0 obj (Security Levels and Protection Lifetimes) endobj 249 0 obj << /S /GoTo /D (section.4) >> endobj 252 0 obj (Signature Schemes) endobj 253 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 256 0 obj (Elliptic Curve Digital Signature Algorithm) endobj 257 0 obj << /S /GoTo /D (subsubsection.4.1.1) >> endobj 260 0 obj (Scheme Setup) endobj 261 0 obj << /S /GoTo /D (subsubsection.4.1.2) >> endobj 264 0 obj (Key Deployment) endobj 265 0 obj << /S /GoTo /D (subsubsection.4.1.3) >> endobj 268 0 obj (Signing Operation) endobj 269 0 obj << /S /GoTo /D (subsubsection.4.1.4) >> endobj 272 0 obj (Verifying Operation) endobj 273 0 obj << /S /GoTo /D (subsubsection.4.1.5) >> endobj 276 0 obj (Alternative Verifying Operation) endobj 277 0 obj << /S /GoTo /D (subsubsection.4.1.6) >> endobj 280 0 obj (Public Key Recovery Operation) endobj 281 0 obj << /S /GoTo /D (subsubsection.4.1.7) >> endobj 284 0 obj (Self-Signing Operation) endobj 285 0 obj << /S /GoTo /D (section.5) >> endobj 288 0 obj (Encryption and Key Transport Schemes) endobj 289 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 292 0 obj (Elliptic Curve Integrated Encryption Scheme) endobj 293 0 obj << /S /GoTo /D (subsubsection.5.1.1) >> endobj 296 0 obj (Scheme Setup) endobj 297 0 obj << /S /GoTo /D (subsubsection.5.1.2) >> endobj 300 0 obj (Key Deployment) endobj 301 0 obj << /S /GoTo /D (subsubsection.5.1.3) >> endobj 304 0 obj (Encryption Operation) endobj 305 0 obj << /S /GoTo /D (subsubsection.5.1.4) >> endobj 308 0 obj (Decryption Operation) endobj 309 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 312 0 obj (Wrapped Key Transport Scheme) endobj 313 0 obj << /S /GoTo /D (section.6) >> endobj 316 0 obj (Key Agreement Schemes) endobj 317 0 obj << /S /GoTo /D (subsection.6.1) >> endobj 320 0 obj (Elliptic Curve Diffie-Hellman Scheme) endobj 321 0 obj << /S /GoTo /D (subsubsection.6.1.1) >> endobj 324 0 obj (Scheme Setup) endobj 325 0 obj << /S /GoTo /D (subsubsection.6.1.2) >> endobj 328 0 obj (Key Deployment) endobj 329 0 obj << /S /GoTo /D (subsubsection.6.1.3) >> endobj 332 0 obj (Key Agreement Operation) endobj 333 0 obj << /S /GoTo /D (subsection.6.2) >> endobj 336 0 obj (Elliptic Curve MQV Scheme) endobj 337 0 obj << /S /GoTo /D (subsubsection.6.2.1) >> endobj 340 0 obj (Scheme Setup) endobj 341 0 obj << /S /GoTo /D (subsubsection.6.2.2) >> endobj 344 0 obj (Key Deployment) endobj 345 0 obj << /S /GoTo /D (subsubsection.6.2.3) >> endobj 348 0 obj (Key Agreement Operation) endobj 349 0 obj << /S /GoTo /D (section.A) >> endobj 352 0 obj (Glossary) endobj 353 0 obj << /S /GoTo /D (subsection.A.1) >> endobj 356 0 obj (Terms) endobj 357 0 obj << /S /GoTo /D (subsection.A.2) >> endobj 360 0 obj (Acronyms, Initialisms and Other Abbreviations) endobj 361 0 obj << /S /GoTo /D (subsection.A.3) >> endobj 364 0 obj (Notation) endobj 365 0 obj << /S /GoTo /D (section.B) >> endobj 368 0 obj (Commentary) endobj 369 0 obj << /S /GoTo /D (subsection.B.1) >> endobj 372 0 obj (Commentary on Section 2 --- Mathematical Foundations) endobj 373 0 obj << /S /GoTo /D (subsection.B.2) >> endobj 376 0 obj (Commentary on Section 3 --- Cryptographic Components) endobj 377 0 obj << /S /GoTo /D (subsubsection.B.2.1) >> endobj 380 0 obj (Commentary on Elliptic Curve Domain Parameters) endobj 381 0 obj << /S /GoTo /D (subsubsection.B.2.2) >> endobj 384 0 obj (Commentary on Elliptic Curve Key Pairs) endobj 385 0 obj << /S /GoTo /D (subsubsection.B.2.3) >> endobj 388 0 obj (Commentary on Elliptic Curve Diffie-Hellman Primitives) endobj 389 0 obj << /S /GoTo /D (subsubsection.B.2.4) >> endobj 392 0 obj (Commentary on the Elliptic Curve MQV Primitive) endobj 393 0 obj << /S /GoTo /D (subsubsection.B.2.5) >> endobj 396 0 obj (Commentary on Hash Functions) endobj 397 0 obj << /S /GoTo /D (subsubsection.B.2.6) >> endobj 400 0 obj (Commentary on Key Derivation Functions) endobj 401 0 obj << /S /GoTo /D (subsubsection.B.2.7) >> endobj 404 0 obj (Commentary on MAC Schemes) endobj 405 0 obj << /S /GoTo /D (subsubsection.B.2.8) >> endobj 408 0 obj (Commentary on Symmetric Encryption Schemes) endobj 409 0 obj << /S /GoTo /D (subsubsection.B.2.9) >> endobj 412 0 obj (Commentary on Key Wrap Schemes) endobj 413 0 obj << /S /GoTo /D (subsubsection.B.2.10) >> endobj 416 0 obj (Commentary on Random Number Generation) endobj 417 0 obj << /S /GoTo /D (subsubsection.B.2.11) >> endobj 420 0 obj (Commentary on Security Levels and Protection Lifetimes) endobj 421 0 obj << /S /GoTo /D (subsection.B.3) >> endobj 424 0 obj (Commentary on Section 4 --- Signature Schemes) endobj 425 0 obj << /S /GoTo /D (subsubsection.B.3.1) >> endobj 428 0 obj (Commentary on the Elliptic Curve Digital Signature Algorithm) endobj 429 0 obj << /S /GoTo /D (subsection.B.4) >> endobj 432 0 obj (Commentary on Section 5 --- Encryption Schemes) endobj 433 0 obj << /S /GoTo /D (subsubsection.B.4.1) >> endobj 436 0 obj (Commentary on the Elliptic Curve Integrated Encryption Scheme) endobj 437 0 obj << /S /GoTo /D (subsubsection.B.4.2) >> endobj 440 0 obj (Commentary on Wrapped Key Transport Scheme) endobj 441 0 obj << /S /GoTo /D (subsection.B.5) >> endobj 444 0 obj (Commentary on Section 6 --- Key Agreement Schemes) endobj 445 0 obj << /S /GoTo /D (subsubsection.B.5.1) >> endobj 448 0 obj (Commentary on the Elliptic Curve Diffie-Hellman Scheme) endobj 449 0 obj << /S /GoTo /D (subsubsection.B.5.2) >> endobj 452 0 obj (Commentary on the Elliptic Curve MQV Scheme) endobj 453 0 obj << /S /GoTo /D (subsection.B.6) >> endobj 456 0 obj (Alignment with Other Standards) endobj 457 0 obj << /S /GoTo /D (section.C) >> endobj 460 0 obj (ASN.1 for Elliptic Curve Cryptography) endobj 461 0 obj << /S /GoTo /D (subsection.C.1) >> endobj 464 0 obj (Syntax for Finite Fields) endobj 465 0 obj << /S /GoTo /D (subsection.C.2) >> endobj 468 0 obj (Syntax for Elliptic Curve Domain Parameters) endobj 469 0 obj << /S /GoTo /D (subsection.C.3) >> endobj 472 0 obj (Syntax for Elliptic Curve Public Keys) endobj 473 0 obj << /S /GoTo /D (subsection.C.4) >> endobj 476 0 obj (Syntax for Elliptic Curve Private Keys) endobj 477 0 obj << /S /GoTo /D (subsection.C.5) >> endobj 480 0 obj (Syntax for Signature and Key Establishment Schemes) endobj 481 0 obj << /S /GoTo /D (subsection.C.6) >> endobj 484 0 obj (Syntax for Key Derivation Functions) endobj 485 0 obj << /S /GoTo /D (subsection.C.7) >> endobj 488 0 obj (Protocol Data Unit Syntax) endobj 489 0 obj << /S /GoTo /D (subsection.C.8) >> endobj 492 0 obj (ASN.1 Module) endobj 493 0 obj << /S /GoTo /D (section*.4) >> endobj 496 0 obj (References) endobj 497 0 obj << /S /GoTo /D [498 0 R /FitH ] >> endobj 500 0 obj << /Length 650 /Filter /FlateDecode >> stream xÚmSMoÛ0½÷W;I@,Y; ͲÃÐ]Ö`uÏv©8nþû¢]¤C/6%~¼÷Hêfwõñ«¼v>X±ÛF>8 ´Ö]ûKÞÍ*Y²VÖª 9µgU¸Xɽ²N¶{rß7}7Ì|³(óå4S}:¼¨ß»oY ktøGÌ"h "L¹Ý`c%`ÉOªð&ÈíñØãé4÷ û6OÓ³²QvttrÎ)cA4k ?(äp©6ymñ¦(AWƧ¼é&¬?>bILûÑ»zjä@Dà4ª µ:ίnfä[E#¿ÔCßBÿ·Ëÿ&wÃGÊû;ðí½) uÕ±¤RW!Ea2ZûøÁDÎÌñû¨ñÃÖ{²Ám"p5Öf "U(Ó%îAö¯â3´X®ÛàÁ¤5Ĩâβ4z&£'RYlÌ¥ô*7 08ýy# ÒbÄÕHØcçr¹C½yê´ÁÙÂhg9ò½²«É²Aê(öÑØ©kdçé¯Èô2ýÊBð¶o²ÌaÙqþ<Òßã(NÊV¹ t{ AÙÕbö"Ã>åQú@á3¯Ä£fOײïKçgbÞ®ý}«@.ülsýñkp½Ýów7Ó+G©e-äÛç÷Á[¼Ãä@µè3Kj¾ {ûvþ|T2¿}4M×N×´®ÃÂñxdã±»©¯×Ó¥¦q ìZ Oݾ^G|ÖÏy¬WÛÝÕ?u$7Sendstream endobj 498 0 obj << /Type /Page /Contents 500 0 R /Resources 499 0 R /MediaBox [0 0 612 792] /Parent 521 0 R >> endobj 501 0 obj << /D [498 0 R /XYZ 55.7908 740.1942 null] >> endobj 502 0 obj << /D [498 0 R /XYZ 55.7908 728.2391 null] >> endobj 499 0 obj << /Font << /F27 505 0 R /F25 508 0 R /F26 511 0 R /F38 514 0 R /F39 517 0 R /F40 520 0 R >> /ProcSet [ /PDF /Text ] >> endobj 524 0 obj << /Length 1349 /Filter /FlateDecode >> stream xÚíKsâFÇï| ¥&ó~cSÞTj71µÍÐÚªBðóéÓóXg7 Kù y4Òüþ=îWãÁ7D #Æ"!2XGs$¨ÆÓñÝh¤ªØß'Æù%)g"¦'Ço£ñDþÈó$Ì@C¨hRþ|ø£é Go1£Eô:chTÆÍ3³ÁÝà×Íi3eÚóÊ>?gQÁ·HD53nÃ*!ñ