Registration number (WIID)Project No.TitleStatus
67398ISO/IEC 27007:2017Information technology — Security techniques — Guidelines for information security management systems auditingAtcelts
24273ISO/IEC 9798-4:1995Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check functionAtcelts
60365ISO/IEC 9798-2:2008/Cor 2:2012Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Technical Corrigendum 2Atcelts
52906ISO/IEC 19790:2012Information technology — Security techniques — Security requirements for cryptographic modulesAtcelts
50476ISO/IEC 10116:2006/Cor 1:2008Information technology — Security techniques — Modes of operation for an n-bit block cipher — Technical Corrigendum 1Atcelts
31487ISO/IEC 10118-2:2000Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipherAtcelts
50432ISO/IEC 13888-1:2009Information technology — Security techniques — Non-repudiation — Part 1: GeneralAtcelts
41529ISO/IEC 24759:2008Information technology — Security techniques — Test requirements for cryptographic modulesAtcelts
46435ISO/IEC 18033-3:2005/Cor 3:2008Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Technical Corrigendum 3: .Atcelts
27170ISO/IEC 15292:2001Information technology - Security techniques - Protection Profile registration proceduresAtcelts
Displaying 481-490 of 774 results.