ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
51617 | ISO/IEC 9798-2:1999/NP Amd 1 | Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symmetric encipherment algorithms — Amendment 1 | Izstrādē |
86919 | ISO/IEC PWI 22054 | Modes of operations for tweakable ciphers | Izstrādē |
59649 | ISO/IEC 18033-3:2010/WD Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Russian Block Cipher GOST | Izstrādē |
91022 | ISO/IEC AWI 28033-5 | Fully homomorphic encryption — Part 5: Mechanisms for Scheme Switching | Izstrādē |
83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
81627 | ISO/IEC WD TS 27115.3 | Cybersecurity evaluation of complex systems — Introduction and framework overview | Izstrādē |
85935 | ISO/IEC 18014-1:2008/PRF Amd 1 | Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1 | Izstrādē |
27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
87485 | ISO/IEC 24760-1 | Information security, cybersecurity and privacy protection — A framework for identity management — Part 1: Core concepts and terminology | Izstrādē |
87940 | ISO/IEC CD 11770-8 | Information technology — Security techniques — Part 8: Password-based key derivation | Izstrādē |
Displaying 51-60 of 770 results.