Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers
90.93 Standard confirmed
Information technology — Security techniques — Encryption algorithms — Part 3: Block ciphers — Amendment 1: SM4
60.60 Standard published
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers
90.93 Standard confirmed
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers — Amendment 1: ZUC
60.60 Standard published
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers
90.93 Standard confirmed
Information technology — Security techniques — Encryption algorithms — Part 5: Identity-based ciphers — Amendment 1: SM9 mechanism
60.60 Standard published
IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption
90.20 Standard under periodical review
Information security — Encryption algorithms — Part 7: Tweakable block ciphers
60.60 Standard published
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Methodology for IT security evaluation
90.92 Standard to be revised
Information technology — Security techniques — Cryptographic algorithms and security mechanisms conformance testing
90.93 Standard confirmed
Information technology — Security techniques — Blind digital signatures — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Blind digital signatures — Part 2: Discrete logarithm based mechanisms
90.93 Standard confirmed
Cloud computing — Service level agreement (SLA) framework — Part 4: Components of security and of protection of PII
90.20 Standard under periodical review
Information technology — Security techniques — Secret sharing — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Secret sharing — Part 2: Fundamental mechanisms
90.93 Standard confirmed
Information technology — Security techniques — Security requirements for cryptographic modules
90.92 Standard to be revised
Information technology — Security techniques — Security evaluation of biometrics
90.92 Standard to be revised