Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General
90.93 Standard confirmed
Information security — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation
60.60 Standard published
Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules
60.60 Standard published
Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module
90.60 Close of review
Information technology — Security techniques — Time-stamping services — Part 1: Framework
90.93 Standard confirmed
Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1
40.00 DIS registered
Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens
60.60 Standard published
Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens — Technical Corrigendum 1
40.00 DIS registered
Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens
90.93 Standard confirmed
Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources
90.93 Standard confirmed
Information technology — Security techniques — Random bit generation
90.92 Standard to be revised
Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generation
60.60 Standard published
Information technology — Security techniques — Random bit generation — Technical Corrigendum 1
60.60 Standard published
Information security — Encryption algorithms — Part 1: General
60.60 Standard published
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers
90.60 Close of review
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 1: FACE
60.60 Standard published
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2
20.60 Close of comment period