Registration number (WIID)Project No.TitleStatus
34930ISO/IEC 15946-4:2004Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 4: Digital signatures giving message recoveryAtcelts
39984ISO/IEC 9798-2:1999/Cor 1:2004Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
29062ISO/IEC 9798-3:1998Information technology — Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniquesAtcelts
63755ISO/IEC 18031:2011/Amd 1:2017Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generationAtcelts
39720ISO/IEC 9798-5:2004Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniquesAtcelts
52946ISO/IEC 24745:2011Information technology — Security techniques — Biometric information protectionAtcelts
33928ISO/IEC 19790:2006Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
27170ISO/IEC 15292:2001Information technology - Security techniques - Protection Profile registration proceduresAtcelts
31077ISO/IEC 15946-3:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 3: Key establishmentAtcelts
43181ISO/IEC 10118-3:2004/Amd 1:2006Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)Atcelts
Displaying 271-280 of 770 results.