Registration number (WIID)Project No.TitleStatus
54532ISO/IEC 18033-4:2011Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphersStandarts spēkā
54531ISO/IEC 18033-3:2010Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphersStandarts spēkā
54530ISO/IEC 18033-1:2015Information technology — Security techniques — Encryption algorithms — Part 1: GeneralAtcelts
54529ISO/IEC 9798-6:2010Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transferStandarts spēkā
54528ISO/IEC 18033-1:2005/Amd 1:2011Information technology — Security techniques — Encryption algorithms — Part 1: General — Amendment 1Atcelts
54527ISO/IEC 11770-5:2011Information technology — Security techniques — Key management — Part 5: Group key managementAtcelts
53634ISO/IEC 9798-1:2010Information technology — Security techniques — Entity authentication — Part 1: GeneralStandarts spēkā
53634ISO/IEC 9798-1:2010Information technology — Security techniques — Entity authentication — Part 1: GeneralStandarts spēkā
53613ISO/IEC 14888-3:2006/Amd 1:2010Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature AlgorithmAtcelts
53475ISO/IEC 11770-4:2006/Cor 1:2009Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Technical Corrigendum 1Atcelts
Displaying 471-480 of 770 results.