ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
92017 | ISO/IEC PWI 14888-5 | Information technology — Security techniques — Digital signatures with appendix — Part 5: Part-5: lattice-based mechanisms | Izstrādē |
84990 | ISO/IEC PWI 17603 | Confidential computing | Izstrādē |
84991 | ISO/IEC PWI 17618 | Management of digital evidence using verifiable and trustable technology | Izstrādē |
90709 | ISO/IEC PWI 18367 | Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing | Izstrādē |
85923 | ISO/IEC PWI 19541 | Inclusion of key encapsulation mechanisms for Post-Quantum Cryptography in ISO/IEC standards | Izstrādē |
85936 | ISO/IEC PWI 19562 | Investigation of the feasibility and implementation of changes to ISO/IEC 15408 and ISO/IEC 18045 | Izstrādē |
82883 | ISO/IEC PWI 19792 | Information technology — Security techniques — Security evaluation of biometrics | Izstrādē |
86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
86919 | ISO/IEC PWI 22054 | Modes of operations for tweakable ciphers | Izstrādē |
Displaying 581-590 of 774 results.