ISO/IEC 14888-2:2008/Cor 1:2015

Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Technical Corrigendum 1: To ISO/IEC 14888-2:2008 ISO/IEC 14888-2:2008/Cor 1:2015

General information

60.60 Standard published   Sep 15, 2015

ISO/IEC

ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection

International Standard

35.030   IT Security

Life cycle

PREVIOUSLY

PUBLISHED
ISO/IEC 14888-2:2008

NOW

PUBLISHED
ISO/IEC 14888-2:2008/Cor 1:2015
60.60 Standard published
Sep 15, 2015