ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
60475 | ISO/IEC 10118-3:2004/Cor 1:2011 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Technical Corrigendum 1 | Atcelts |
22053 | ISO/IEC 9797:1994 | Information technology — Security techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm | Atcelts |
31076 | ISO/IEC 15946-2:2002 | Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 2: Digital signatures | Atcelts |
50482 | ISO/IEC 18014-2:2009 | Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokens | Atcelts |
25996 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | Atcelts |
62071 | ISO/IEC 27035-2:2016 | Information technology — Security techniques — Information security incident management — Part 2: Guidelines to plan and prepare for incident response | Atcelts |
39984 | ISO/IEC 9798-2:1999/Cor 1:2004 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 1 | Atcelts |
56552 | ISO/IEC 29192-2:2012 | Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphers | Atcelts |
51618 | ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function | Atcelts |
39720 | ISO/IEC 9798-5:2004 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques | Atcelts |
Displaying 371-380 of 770 results.