Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Information technology — Security techniques — Cryptographic techniques based on elliptic curves — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information security — Cryptographic techniques based on elliptic curves — Part 5: Elliptic curve generation

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Testing methods for the mitigation of non-invasive attack classes against cryptographic modules

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Telebiometric authentication framework using biometric hardware security module

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Time-stamping services — Part 1: Framework

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Time-stamping services — Part 1: Framework — Amendment 1

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Time-stamping services — Part 2: Mechanisms producing independent tokens — Technical Corrigendum 1

40.00 DIS registered

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Time-stamping services — Part 3: Mechanisms producing linked tokens

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Time-stamping services — Part 4: Traceability of time sources

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Random bit generation

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Random bit generation — Amendment 1: Deterministic random bit generation

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Random bit generation — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Prime number generation

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Encryption algorithms — Part 1: General

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 1: FACE

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2

20.60 Close of comment period

ISO/IEC JTC 1/SC 27