Projects

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Information technology — Security techniques — Modes of operation for an n-bit block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Modes of operation for an n-bit block cipher — Amendment 1: CTR-ACPKM mode of operation

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 1: General — Amendment 1: Padding methods for sponge functions

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 1: Framework

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27

IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques

90.60 Close of review

ISO/IEC JTC 1/SC 27

Information security — Key management — Part 3: Mechanisms using asymmetric techniques

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: TFNS identity-based key agreement

40.20 DIS ballot initiated: 12 weeks

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets

60.60 Standard published

ISO/IEC JTC 1/SC 27

Information security — Key management — Part 5: Group key management

60.60 Standard published

ISO/IEC JTC 1/SC 27