ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
42723 | ISO/IEC WD 19772 | Information technology — Security techniques — Authenticated encryption | Izstrādē |
71517 | ISO/IEC 11770-3:2015/NP Amd 2 | Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 2 | Izstrādē |
84246 | ISO/IEC PWI 13042 | Consideration of the Security Model for Mechanism 7a in ISO/IEC 9798-6 | Izstrādē |
71290 | ISO/IEC NP 18032 | Information technology Security techniques Prime number generation | Izstrādē |
39006 | ISO/IEC 10118-3:2003/NP Amd 1 | Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1 | Izstrādē |
69403 | ISO/IEC NP 20897 | Information technology — Security techniques — Security requirements, test and evaluation methods for physically unclonable functions for generating nonstored security parameters | Izstrādē |
85851 | ISO/IEC CD 29128-3 | Information security, cybersecurity and privacy protection — Verification of cryptographic protocols — Part 3: Evaluation Methods and Activities for Protocol Implementation Verification | Izstrādē |
86924 | ISO/IEC PWI 27033 | Review of 27033 | Izstrādē |
86921 | ISO/IEC PWI 22064 | Inclusion of SPAIBE in ISO/IEC 11770-4 | Izstrādē |
86922 | ISO/IEC PWI 22071 | Inclusion of garbled circuit schemes in SC 27/WG 2 standards | Izstrādē |
Displaying 681-690 of 770 results.