Lines Matching defs:X9
3663 LibTomCrypt uses a unique format for ECC public and private keys. While ANSI X9.63 partially specifies key formats, it does it in a less than ideally simple manner. \
3800 \subsection{ANSI X9.63 Export}
3801 The following function exports an ECC public key in the ANSI X9.63 format:
3809 The ECC key pointed to by \textit{key} is exported in public fashion to the array pointed to by \textit{out}. The ANSI X9.63 format used is from
3812 \subsection{ANSI X9.63 Import}
3813 The following function imports an ANSI X9.63 section 4.3.6 format public ECC key:
3824 \subsection{Extended ANSI X9.63 Import}
3825 The following function allows the importing of an ANSI x9.63 section 4.3.6 format public ECC key using user specified domain parameters:
3847 Note: this function stores only the $x$ co-ordinate of the shared elliptic point as described in ANSI X9.63 ECC--DH.
3850 ECC--DH Encryption is performed by producing a random key, hashing it, and XOR'ing the digest against the plaintext. It is not strictly ANSI X9.63 compliant
3903 There are also functions to sign and verify messages. They use the ANSI X9.62 EC-DSA algorithm to generate and verify signatures in the
3904 ANSI X9.62 format.
3941 The signature code is an implementation of X9.62 EC--DSA, and the output is compliant for GF(p) curves.