Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Lightweight cryptography — Part 8: Authenticated encryption

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Vulnerability handling processes

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Internet of things — Methodology for trustworthiness of IoT system/service

60.60 Standard published

ISO/IEC JTC 1/SC 41

Information security — Secure multiparty computation — Part 1: General

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Check character systems

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27