ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
54528 | ISO/IEC 18033-1:2005/Amd 1:2011 | Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1 | Atcelts |
52906 | ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules | Atcelts |
31142 | ISO/IEC TR 13335-5:2001 | Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | Atcelts |
60365 | ISO/IEC 9798-2:2008/Cor 2:2012 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2 | Atcelts |
51024 | ISO/IEC 18033-4:2005/Amd 1:2009 | Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and Decim | Atcelts |
24273 | ISO/IEC 9798-4:1995 | Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function | Atcelts |
46345 | ISO/IEC 19772:2009 | Information technology — Security techniques — Authenticated encryption | Atcelts |
67398 | ISO/IEC 27007:2017 | Information technology — Security techniques — Guidelines for information security management systems auditing | Atcelts |
40613 | ISO/IEC 15408-2:2005 | Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirements | Atcelts |
18102 | ISO/IEC 10116:1991 | Information technology — Modes of operation for an n-bit block cipher algorithm | Atcelts |
Displaying 321-330 of 770 results.