Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1
60.60 Standard published
Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions
90.93 Standard confirmed
Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)
60.60 Standard published
Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols
60.60 Standard published
Information security — Lightweight cryptography — Part 8: Authenticated encryption
60.60 Standard published
Information technology — Security techniques — Vulnerability handling processes
60.60 Standard published
Information technology — Internet of things — Methodology for trustworthiness of IoT system/service
60.60 Standard published
Information security — Secure multiparty computation — Part 1: General
60.60 Standard published
Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing
60.60 Standard published
Information technology — Security techniques — Check character systems
90.93 Standard confirmed
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms
90.93 Standard confirmed
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms
90.93 Standard confirmed
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher
90.93 Standard confirmed
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1
60.60 Standard published
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function
60.60 Standard published
Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1
40.00 DIS registered
Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function
90.93 Standard confirmed