ISO/IEC JTC 1/SC 27
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 91718 | ISO/IEC 14888-2:2008/AWI Amd 1 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1 | Izstrādē |
| 91719 | ISO/IEC 14888-2:2008/AWI Amd 2 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2 | Izstrādē |
| 68231 | ISO/IEC 14888-2:2008/Cor 1:2015 | Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 | Standarts spēkā |
| 25996 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | Atcelts |
| 36013 | ISO/IEC 14888-3:1998/Cor 1:2001 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms — Technical Corrigendum 1 | Atcelts |
| 43656 | ISO/IEC 14888-3:2006 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | Atcelts |
| 53613 | ISO/IEC 14888-3:2006/Amd 1:2010 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | Atcelts |
| 56551 | ISO/IEC 14888-3:2006/Amd 2:2012 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | Atcelts |
| 46470 | ISO/IEC 14888-3:2006/Cor 1:2007 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 1 | Atcelts |
| 52498 | ISO/IEC 14888-3:2006/Cor 2:2009 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Technical Corrigendum 2 | Atcelts |
Displaying 71-80 of 791 results.
