ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 91840 | ISO/IEC WD 25888 | Information security — Algorithmic mechanisms to protect symmetric algorithms in hardware against side-channel attacks | Izstrādē |
| 89719 | ISO/IEC PWI 25279 | Inclusion of EdDSA and supporting additional hash functions in 14888-3 | Izstrādē |
| 30799 | ISO/IEC WD 18014 | Information technology — Time Stamping Services | Izstrādē |
| 41530 | ISO/IEC NP 24760 | Information Technology — Security Techniques — A Framework for Identity Management | Izstrādē |
| 82878 | ISO/IEC FDIS 27017 | Information security, cybersecurity and privacy protection — Information security controls based on ISO/IEC 27002 for cloud services | Izstrādē |
| 87641 | ISO/IEC FDIS 28033-4 | Information Security — Fully homomorphic encryption — Part 4: Mechanisms for arithmetic based on look-up table evaluation | Izstrādē |
| 27689 | ISO/IEC CD 15446 | Information technology — Security techniques — Guide for the production of Protection profiles and Security Targets | Izstrādē |
| 84245 | ISO/IEC PWI 13035 | Amendment of Identity-Based Authenticated Key Exchange | Izstrādē |
| 27635 | ISO/IEC CD 15408-4 | Information technology — Security techniques — Evaluation criteria for IT security — Part 4: Security assurance requirements | Izstrādē |
| 66671 | ISO/IEC NP TS 14516-2 | Information technology — Security techniques — Guidelines for the use and management of electronic trust service providers — Part 2: Guidelines on information security for CA trust service providers | Izstrādē |
Displaying 741-750 of 807 results.
