ISO/IEC JTC 1/SC 27
Registration number (WIID) | Project No. | Title | Status |
---|---|---|---|
52498 | ISO/IEC 14888-3:2006/Cor 2:2009 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2 | Atcelts |
46470 | ISO/IEC 14888-3:2006/Cor 1:2007 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Atcelts |
56551 | ISO/IEC 14888-3:2006/Amd 2:2012 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | Atcelts |
53613 | ISO/IEC 14888-3:2006/Amd 1:2010 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | Atcelts |
43656 | ISO/IEC 14888-3:2006 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | Atcelts |
36013 | ISO/IEC 14888-3:1998/Cor 1:2001 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1 | Atcelts |
25996 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | Atcelts |
68231 | ISO/IEC 14888-2:2008/Cor 1:2015 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 | Standarts spēkā |
91719 | ISO/IEC 14888-2:2008/AWI Amd 2 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2 | Izstrādē |
91718 | ISO/IEC 14888-2:2008/AWI Amd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 | Izstrādē |
Displaying 691-700 of 770 results.