Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Information technology — Security techniques — Modes of operation for an n-bit block cipher — Amendment 1: CTR-ACPKM mode of operation
60.60 Standard published
Information technology — Security techniques — Modes of operation for an n-bit block cipher
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 1: General — Amendment 1: Padding methods for sponge functions
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
90.93 Standard confirmed
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
90.93 Standard confirmed
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Amendment 1: Object identifiers
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic — Technical Corrigendum 1
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
90.93 Standard confirmed
Information technology — Security techniques — Key management — Part 1: Framework
90.93 Standard confirmed
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
90.93 Standard confirmed
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 1: Unbalanced Password-Authenticated Key Agreement with Identity-Based Cryptosystems (UPAKA-IBC)
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets — Amendment 2: Leakage-resilient password-authenticated key agreement with additional stored secrets
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
90.92 Standard to be revised
Information security — Key management — Part 5: Group key management
60.60 Standard published
Information technology — Security techniques — Key management — Part 6: Key derivation
90.93 Standard confirmed