{"id":350684,"date":"2024-10-20T00:43:34","date_gmt":"2024-10-20T00:43:34","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-10118-12016-tc\/"},"modified":"2024-10-26T00:31:57","modified_gmt":"2024-10-26T00:31:57","slug":"bs-iso-iec-10118-12016-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-10118-12016-tc\/","title":{"rendered":"BS ISO\/IEC 10118-1:2016 – TC"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
1<\/td>\n | compares BS ISO\/IEC 10118-1:2016 <\/td>\n<\/tr>\n | ||||||
2<\/td>\n | TRACKED CHANGES Text example 1 \u2014 indicates added text (in green) <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 4 Symbols and abbreviated terms 4.1 General symbols <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 4.2 Symbols specific to this document 4.3 Coding conventions 5 Requirements 6 General model for hash-functions 6.1 General <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.2 Hashing operation 6.2.1 General 6.2.2 Step 1 (padding) 6.2.3 Step 2 (splitting) 6.2.4 Step 3 (iteration) 6.2.5 Step 4 (output transformation) <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.3 Use of the general model <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Annex\u00a0A (normative) Padding methods <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Annex\u00a0B (normative) Criteria for submission of hash-functions for possible inclusion in ISO\/IEC\u00a010118 (all parts) <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | Annex\u00a0C (informative) Security considerations <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Tracked Changes. Information technology. Security techniques. Hash-functions – General<\/b><\/p>\n |