Registration number (WIID)Project No.TitleStatus
60475ISO/IEC 10118-3:2004/Cor 1:2011Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1Atcelts
22053ISO/IEC 9797:1994Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithmAtcelts
31076ISO/IEC 15946-2:2002Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signaturesAtcelts
50482ISO/IEC 18014-2:2009Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
25996ISO/IEC 14888-3:1998Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanismsAtcelts
62071ISO/IEC 27035-2:2016Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident responseAtcelts
39984ISO/IEC 9798-2:1999/Cor 1:2004Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1Atcelts
56552ISO/IEC 29192-2:2012Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphersAtcelts
51618ISO/IEC 9797-2:2011Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-functionAtcelts
39720ISO/IEC 9798-5:2004Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniquesAtcelts
Displaying 371-380 of 770 results.