ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 84986 | ISO/IEC PWI 4922-3 | Secure multiparty computation — Part 3: Mechanisms based on garbled circuit | Izstrādē |
| 89943 | ISO/IEC WD 25330 | Information Security — Oblivious Transfer | Izstrādē |
| 80399 | ISO/IEC WD 27566 | Information security, cybersecurity and privacy protection — Age assurance systems — Framework | Izstrādē |
| 84242 | ISO/IEC CD TS 27008.3 | Information technology — Security techniques — Guidelines for the assessment of information security controls | Izstrādē |
| 91022 | ISO/IEC WD 28033-5 | Information security — Fully homomorphic encryption — Part 5: Mechanisms for scheme switching | Izstrādē |
| 86885 | ISO/IEC PWI 21867 | Modes of operations for tweakable ciphers | Izstrādē |
| 86886 | ISO/IEC PWI 20009 | Inclusion of the ZYHW anonymous entity authentication mechanism in ISO/IEC 20009-4 | Izstrādē |
| 86890 | ISO/IEC 18033-2:2006/FDAmd 2 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2 | Izstrādē |
| 19684 | ISO/IEC WD 11767 | Information technology security techniques — Collection and analysis of requirements for information technology security evaluation criteria | Izstrādē |
| 30818 | ISO/IEC WD 18033 | Information technology — Encryption algorithms | Izstrādē |
Displaying 751-760 of 793 results.
