Standard
Available (268)
Showing 217 - 228 per page
Standard
ISO/IEC JTC 1/SC 27 11770-5:2011 - Key management - Part 5: Group key management
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities...Standard
ISO/IEC JTC 1/SC 27 11770-4:2017 - Key management - Part 4: Mechanisms based on weak secrets
This document defines key establishment mechanisms based on weak secrets, i.e. secrets ...Standard
ISO/IEC JTC 1/SC 27 11770-3:2015 - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric crypto...Standard
ISO/IEC JTC 1/SC 27 11770-2:2018 - Key management - Part 2: Mechanisms using symmetric techniques
This document defines key establishment mechanisms using symmetric cryptographic techni...Standard
ISO/IEC JTC 1/SC 27 11770-1:2010 - Key management - Part 1: Framework
In information technology there is an ever-increasing need to use cryptographic mechani...Standard
ISO/IEC JTC 1/SC 27 10118-3:2018 Hash-functions - Part 3: Dedicated hash-functions
This document specifies dedicated hash-functions, i.e. specially designed hash-function...Standard
ISO/IEC JTC 1/SC 27 10118-2:2010 - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
This part of ISO/IEC 10118 specifies hash-functions which make use of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 10118-1:2016 - Hash-functions - Part 1: General
ISO/IEC 10118 specifies hash-functions and is therefore applicable to the provision of ...Standard
ISO/IEC JTC 1/SC 27 10116:2017 - Modes of operation for an n-bit block cipher
This document establishes five modes of operation for applications of an n-bit block ci...Standard
ISO/IEC JTC 1/SC 27 9798-6:2010 - Entity authentication - Part 6: Mechanisms using manual data transfer
This part of ISO/IEC 9798 specifies eight entity authentication mechanisms based on man...Standard