Registration number (WIID)Project No.TitleStatus
59648ISO/IEC 27036-1:2014Information technology — Security techniques — Information security for supplier relationships — Part 1: Overview and conceptsAtcelts
56552ISO/IEC 29192-2:2012Information technology — Security techniques — Lightweight cryptography — Part 2: Block ciphersAtcelts
46470ISO/IEC 14888-3:2006/Cor 1:2007Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1Atcelts
52498ISO/IEC 14888-3:2006/Cor 2:2009Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2Atcelts
39723ISO/IEC 11770-4:2006Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secretsAtcelts
46370ISO/IEC 11770-2:2008Information technology — Security techniques — Key management — Part 2: Mechanisms using symmetric techniquesAtcelts
62399ISO/IEC 9798-2:2008/Cor 3:2013Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 3Atcelts
68294ISO/IEC TS 20540:2018Information technology — Security techniques — Testing cryptographic modules in their operational environmentAtcelts
34387ISO/IEC 18014-2:2002Information technology — Security techniques — Time-stamping services — Part 2: Mechanisms producing independent tokensAtcelts
19687ISO/IEC 11770-1:1996Information technology — Security techniques — Key management — Part 1: FrameworkAtcelts
Displaying 451-460 of 807 results.