Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: SM4

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: ZUC

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers — Amendment 1: SM9 mechanism

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Information security — Encryption algorithms — Part 7: Tweakable block ciphers

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Blind digital signatures — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII

90.20 Standard under periodical review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Secret sharing — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information security — Authenticated encryption

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security requirements for cryptographic modules

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Security evaluation of biometrics

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27