Standards search

Use the form below to find particular standards or projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”. You can also search using the Advance Search facility.

Elements of fair and functioning data economy: identity, consent and logging

90.93 Standard confirmed

CEN/WS IHAN

Guidelines for Traditional Micro-SMEs’ GDPR Compliance

60.60 Standard published

CEN/WS 111

European Digital Identity Wallets standards Gap Analysis

60.60 Standard published

CEN/TC 224

The QaR method to measure the extreme risk of re-identification of a database in the context of assessing its insurability

60.60 Standard published

CEN/WS QaR

Intelligent transport systems - ITS station security services for secure session establishment and authentication between trusted devices (ISO 21177:2024)

60.60 Standard published

CEN/TC 278

Framework for standardization of signatures - Extended structure including electronic identification and authentication

60.60 Standard published

CEN/TC 224

Rationalized structure for electronic signature standardization - Best practices for SMEs

60.60 Standard published

CEN/TC 224

Rationalized structure for electronic signature standardization - Guidelines for citizens

60.60 Standard published

CEN/TC 224

Guidance for signature creation and other related devices

60.60 Standard published

CEN/TC 224

Applicability of CEN Standards to Qualified Electronic Seal Creation Device under the EU Regulation N°910/2014 (eIDAS)

60.60 Standard published

CEN/TC 224

Protection profiles for secure signature creation device - Part 1: Overview

90.93 Standard confirmed

CEN/TC 224

Protection profiles for secure signature creation device - Part 2: Device with key generation

90.60 Close of review

CEN/TC 224

Protection profiles for secure signature creation device - Part 3: Device with key import

90.20 Standard under periodical review

CEN/TC 224

Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted channel to certificate generation application

90.20 Standard under periodical review

CEN/TC 224

Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application

90.20 Standard under periodical review

CEN/TC 224

Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application

90.93 Standard confirmed

CEN/TC 224

Protection Profiles for TSP cryptographic modules - Part 1: Overview

90.93 Standard confirmed

CEN/TC 224

Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup

90.93 Standard confirmed

CEN/TC 224