Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Framework for standardization of signatures - Extended structure including electronic identification and authentication
60.60 Standard published
Rationalized structure for electronic signature standardization - Best practices for SMEs
60.60 Standard published
Rationalized structure for electronic signature standardization - Guidelines for citizens
60.60 Standard published
Guidance for signature creation and other related devices
60.60 Standard published
Protection profiles for secure signature creation device - Part 1: Overview
90.93 Standard confirmed
Protection profiles for secure signature creation device - Part 2: Device with key generation
90.60 Close of review
Protection profiles for secure signature creation device - Part 3: Device with key import
90.60 Close of review
Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
90.60 Close of review
Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application
90.60 Close of review
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
90.93 Standard confirmed
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions
90.93 Standard confirmed
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services
90.60 Close of review
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 3: Device authentication protocols
90.60 Close of review
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 4: Privacy specific Protocols
90.93 Standard confirmed
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 5: Trusted eService
90.93 Standard confirmed
Protection Profiles for TSP cryptographic modules - Part 1: Overview
90.93 Standard confirmed
Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup
90.93 Standard confirmed