Registration number (WIID)Project No.TitleStatus
33929ISO/IEC TR 19791:2006Information technology — Security techniques — Security assessment of operational systemsAtcelts
41529ISO/IEC 24759:2008Information technology — Security techniques — Test requirements for cryptographic modulesAtcelts
41693ISO/IEC TR 15443-3:2007Information technology — Security techniques — A framework for IT security assurance — Part 3: Analysis of assurance methodsAtcelts
50432ISO/IEC 13888-1:2009Information technology — Security techniques — Non-repudiation — Part 1: GeneralAtcelts
46435ISO/IEC 18033-3:2005/Cor 3:2008Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: .Atcelts
63755ISO/IEC 18031:2011/Amd 1:2017Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generationAtcelts
53613ISO/IEC 14888-3:2006/Amd 1:2010Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature AlgorithmAtcelts
31143ISO/IEC 10118-1:2000Information technology — Security techniques — Hash-functions — Part 1: GeneralAtcelts
30653ISO/IEC 9798-2:1999Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithmsAtcelts
27743ISO/IEC 9798-1:1997Information technology — Security techniques — Entity authentication — Part 1: GeneralAtcelts
Displaying 331-340 of 774 results.