ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 90708 | ISO/IEC 29192-8:2022/DAmd 1 | Information security — Lightweight cryptography — Part 8: Authenticated encryption — Amendment 1 | Aptauja |
| 85851 | ISO/IEC DIS 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation methods and activities for protocol implementation verification | Aptauja |
| 90707 | ISO/IEC 18033-7:2022/DAmd 1 | Information security — Encryption algorithms — Part 7: Tweakable block ciphers — Amendment 1 | Aptauja |
| 90706 | ISO/IEC 29192-4:2013/DAmd 2 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 2 | Aptauja |
| 87640 | ISO/IEC DIS 28033-3 | Information security — Fully homomorphic encryption — Part 3: Mechanisms for arithmetic on approximate numbers | Aptauja |
| 87639 | ISO/IEC DIS 28033-2 | Information security — Fully homomorphic encryption — Part 2: Mechanisms for exact arithmetic on modular integers | Aptauja |
| 88131 | ISO/IEC 20009-4:2017/DAmd 1 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets — Amendment 1 | Aptauja slēgta |
| 87940 | ISO/IEC DIS 11770-8 | Information security — Key management — Part 8: Password-based key derivation | Aptauja slēgta |
| 88130 | ISO/IEC DIS 11770-4 | Information security — Key management — Part 4: Mechanisms based on weak secrets | Aptauja slēgta |
| 56581 | ISO/IEC DIS 27090 | Cybersecurity — Artificial Intelligence — Guidance for addressing security threats and compromises to artificial intelligence systems | Aptauja slēgta |
Displaying 541-550 of 793 results.
