{"id":349669,"date":"2024-10-20T00:38:00","date_gmt":"2024-10-20T00:38:00","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-10118-12016\/"},"modified":"2024-10-26T00:20:37","modified_gmt":"2024-10-26T00:20:37","slug":"bs-iso-iec-10118-12016","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-10118-12016\/","title":{"rendered":"BS ISO\/IEC 10118-1:2016"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 4 Symbols and abbreviated terms 4.1 General symbols <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 4.2 Symbols specific to this document 4.3 Coding conventions 5 Requirements 6 General model for hash-functions 6.1 General <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 6.2 Hashing operation 6.2.1 General 6.2.2 Step 1 (padding) 6.2.3 Step 2 (splitting) 6.2.4 Step 3 (iteration) 6.2.5 Step 4 (output transformation) <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 6.3 Use of the general model <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | Annex\u00a0A (normative) Padding methods <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | Annex\u00a0B (normative) Criteria for submission of hash-functions for possible inclusion in ISO\/IEC\u00a010118 (all parts) <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | Annex\u00a0C (informative) Security considerations <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Security techniques. Hash-functions – General<\/b><\/p>\n |