ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 86919 | ISO/IEC PWI 22054 | Modes of operations for tweakable ciphers | Izstrādē |
| 59649 | ISO/IEC 18033-3:2010/WD Amd 1 | Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: Russian Block Cipher GOST | Izstrādē |
| 83139 | ISO/IEC WD 18033-8 | Information security — Encryption algorithms — Part 8: Fully Homomorphic Encryption | Izstrādē |
| 91840 | ISO/IEC WD 25888 | Information security — Algorithmic mechanisms to protect symmetric algorithms in hardware against side-channel attacks | Izstrādē |
| 27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
| 91772 | ISO/IEC PWI 25860 | Authenticator exploration | Izstrādē |
| 92946 | ISO/IEC WD 30111 | Cybersecurity — Vulnerability handling and disclosure processes | Izstrādē |
| 90709 | ISO/IEC WD 18367 | Information security, cybersecurity and privacy protection — Cryptographic algorithms and security mechanisms conformance testing | Izstrādē |
| 91773 | ISO/IEC PWI 25863 | Exploration of Security and privacy characteristics for digital identity wallets managing digital credentials | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
Displaying 591-600 of 807 results.
