Registration number (WIID)Project No.TitleStatus
54528ISO/IEC 18033-1:2005/Amd 1:2011Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1Atcelts
52906ISO/IEC 19790:2012Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
31142ISO/IEC TR 13335-5:2001Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network securityAtcelts
60365ISO/IEC 9798-2:2008/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2Atcelts
51024ISO/IEC 18033-4:2005/Amd 1:2009Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and DecimAtcelts
24273ISO/IEC 9798-4:1995Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check functionAtcelts
46345ISO/IEC 19772:2009Information technology — Security techniques — Authenticated encryptionAtcelts
67398ISO/IEC 27007:2017Information technology — Security techniques — Guidelines for information security management systems auditingAtcelts
40613ISO/IEC 15408-2:2005Information technology — Security techniques — Evaluation criteria for IT security — Part 2: Security functional requirementsAtcelts
18102ISO/IEC 10116:1991Information technology — Modes of operation for an n-bit block cipher algorithmAtcelts
Displaying 321-330 of 770 results.