Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.
Elements of fair and functioning data economy: identity, consent and logging
90.93 Standard confirmed
The QaR method to measure the extreme risk of re-identification of a database in the context of assessing its insurability
60.60 Standard published
Intelligent transport systems - ITS station security services for secure session establishment and authentication between trusted devices (ISO 21177:2024)
60.60 Standard published
Framework for standardization of signatures - Extended structure including electronic identification and authentication
60.60 Standard published
Rationalized structure for electronic signature standardization - Best practices for SMEs
60.60 Standard published
Rationalized structure for electronic signature standardization - Guidelines for citizens
60.60 Standard published
Guidance for signature creation and other related devices
60.60 Standard published
Applicability of CEN Standards to Qualified Electronic Seal Creation Device under the EU Regulation N°910/2014 (eIDAS)
60.60 Standard published
Protection profiles for secure signature creation device - Part 1: Overview
90.93 Standard confirmed
Protection profiles for secure signature creation device - Part 2: Device with key generation
90.60 Close of review
Protection profiles for secure signature creation device - Part 3: Device with key import
90.20 Standard under periodical review
Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application
90.20 Standard under periodical review
Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application
90.20 Standard under periodical review
Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application
90.93 Standard confirmed
Protection Profiles for TSP cryptographic modules - Part 1: Overview
90.93 Standard confirmed
Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup
90.93 Standard confirmed