ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
65665 | ISO/IEC 10118-4:1998/Cor 1:2014 | Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1 | Standarts spēkā |
65480 | ISO/IEC 15946-1:2016 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General | Standarts spēkā |
65459 | ISO/IEC TS 19608:2018 | Guidance for developing security and privacy functional requirements based on ISO/IEC 15408 | Atcelts |
65425 | ISO/IEC 19592-2:2017 | Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms | Standarts spēkā |
65422 | ISO/IEC 19592-1:2016 | Information technology — Security techniques — Secret sharing — Part 1: General | Standarts spēkā |
65421 | ISO/IEC 19772:2009/Cor 1:2014 | Information technology — Security techniques — Authenticated encryption — Technical Corrigendum 1 | Atcelts |
65275 | ISO/IEC 11770-6:2016 | Information technology — Security techniques — Key management — Part 6: Key derivation | Standarts spēkā |
64591 | ISO/IEC 29192-4:2013/Amd 1:2016 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1 | Standarts spēkā |
64590 | ISO/IEC NP TR 19791 | Information technology — Security techniques — Security assessment of operational systems | Izstrādē |
64576 | ISO/IEC NP 18032 | Information technology — Security techniques — Prime number generation | Izstrādē |
Displaying 351-360 of 774 results.