20.60 Close of comment period Sep 2, 2024
ISO/IEC
ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection
International Standard
This document defines the evaluation methods and activities to assess the artifacts defined in Part 1 for the verification of the correctness and security of a cryptographic protocol specification using the framework from ISO/IEC 15408-4.
IN_DEVELOPMENT
ISO/IEC WD 29128-2.2
20.60
Close of comment period
Sep 2, 2024