IT Security techniques — Digital signatures with appendix —Part 3: Discrete logarithm based mechanismsTechniques d...