Registration number (WIID)Project No.TitleStatus
51024ISO/IEC 18033-4:2005/Amd 1:2009Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: Rabbit and DecimAtcelts
46345ISO/IEC 19772:2009Information technology — Security techniques — Authenticated encryptionAtcelts
39723ISO/IEC 11770-4:2006Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secretsAtcelts
72515ISO/IEC 24759:2017Information technology — Security techniques — Test requirements for cryptographic modulesAtcelts
37970ISO/IEC 18033-1:2005Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
30816ISO/IEC 18031:2005Information technology — Security techniques — Random bit generationAtcelts
40009ISO/IEC 18028-2:2006Information technology — Security techniques — IT network security — Part 2: Network security architectureAtcelts
30653ISO/IEC 9798-2:1999Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithmsAtcelts
57916ISO/IEC 24760-3:2016Information technology — Security techniques — A framework for identity management — Part 3: PracticeAtcelts
43759ISO/IEC TR 27019:2013Information technology — Security techniques — Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industryAtcelts
Displaying 391-400 of 807 results.