ISO/IEC JTC 1/SC 27/WG 2
| Registration number (WIID) | Project No. | Title | Status |
|---|---|---|---|
| 82709 | ISO/IEC 11770-3:2021 | Information security — Key management — Part 3: Mechanisms using asymmetric techniques | Standarts spēkā |
| 80241 | ISO/IEC 15946-5:2022 | Information security — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation | Standarts spēkā |
| 80243 | ISO/IEC 20008-2:2013/Amd 1:2021 | Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 1 | Standarts spēkā |
| 80492 | ISO/IEC 14888-4:2024 | Information security — Digital signatures with appendix — Part 4: Stateful hash-based mechanisms | Standarts spēkā |
| 81794 | ISO/IEC 20008-2:2013/Amd 2:2023 | Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 2 | Standarts spēkā |
| 81645 | ISO/IEC 18031:2025 | Information technology — Security techniques — Random bit generation | Standarts spēkā |
| 62730 | ISO/IEC PWI 29004 | Modes of operation for tweakable block ciphers | Izstrādē |
| 37249 | ISO/IEC PWI 15150 | Fully Homomorphic encryption | Izstrādē |
| 80498 | ISO/IEC NP 20008-3 | Information technology -- Security techniques -- Anonymous digital signatures | Izstrādē |
| 80510 | ISO/IEC NP 4924-2 | Information security -- Secure multiparty computation | Izstrādē |
Displaying 11-20 of 21 results.
