ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
| 85919 | ISO/IEC CD 27003.3 | Information technology — Security techniques — Information security management systems — Guidance | Izstrādē |
| 59649 | ISO/IEC 18033-3:2010/WD Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Russian Block Cipher GOST | Izstrādē |
| 86919 | ISO/IEC PWI 22054 | Modes of operations for tweakable ciphers | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
| 88147 | ISO/IEC CD 27566-3.2 | Information security, cybersecurity and privacy protection – Age assurance systems — Part 3: Approaches to analysis or comparison | Izstrādē |
| 27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
| 88971 | ISO/IEC DIS 25093-1 | Cybersecurity — Confidential computing — Part 1: Overview and concepts | Izstrādē |
| 88121 | ISO/IEC PWI 24836 | Inclusion of oblivious transfer in ISO/IEC JTC 1/SC 27/WG 2 standards | Izstrādē |
| 88127 | ISO/IEC PWI 24843 | Privacy-preserving attribute-based credentials | Izstrādē |
Displaying 211-220 of 807 results.
