ISO/IEC 10118-3:2004
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
Hardcopy , PDF
24-02-2004
09-04-2025
ISO/IEC 10118-3:2004 specifies the following seven dedicated hash-functions, i.e. specially-designed hash-functions:
- the first hash-function (RIPEMD-160) in Clause 7 provides hash-codes of lengths up to 160 bits;
- the second hash-function (RIPEMD-128) in Clause 8 provides hash-codes of lengths up to 128 bits;
- the third hash-function (SHA-1) in Clause 9 provides hash-codes of lengths up to 160 bits;
- the fourth hash-function (SHA-256) in Clause 10 provides hash-codes of lengths up to 256 bits;
- the fifth hash-function (SHA-512) in Clause 11 provides hash-codes of lengths up to 512 bits;
- the sixth hash-function (SHA-384) in Clause 12 provides hash-codes of a fixed length, 384 bits; and
- the seventh hash-function (WHIRLPOOL) in Clause 13 provides hash-codes of lengths up to 512 bits.
For each of these dedicated hash-functions, ISO/IEC 10118-3:2004 specifies a round-function that consists of a sequence of sub-functions, a padding method, initializing values, parameters, constants, and an object identifier as normative information, and also specifies several computation examples as informative information.
| Committee |
ISO/IEC JTC 1/SC 27
|
| DocumentType |
Standard
|
| Pages |
94
|
| PublisherName |
International Organization for Standardization
|
| Status |
Withdrawn
|
| SupersededBy | |
| Supersedes |
| Standards | Relationship |
| BS ISO/IEC 10118-3 : 2004 | Identical |
| CSA ISO/IEC 10118-3A : 2007(R2014) | Identical |
| NEN ISO/IEC 10118-3 : 2004 C1 2011 | Identical |
| AS ISO/IEC 10118.3-2006 | Identical |
| AS ISO/IEC 10118.3 SUPP 1-2006 | Identical |
| INCITS/ISO/IEC 10118-3 : 2003 | Identical |
| BS ISO/IEC 10118-3:2004+A1:2006 | Identical |
| 07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
| I.S. EN 62940:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - INTEGRATED COMMUNICATION SYSTEM (ICS) - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS |
| I.S. EN ISO 12855:2015 | ELECTRONIC FEE COLLECTION - INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING (ISO 12855:2015) |
| IEEE 1076-2008 REDLINE | IEEE Standard VHDL Language Reference Manual |
| 08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| PD CEN/TS 15480-2:2012 | Identification card systems. European Citizen Card Logical data structures and security services |
| INCITS/ISO/IEC 9797-2 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
| BS ISO 21188:2006 | Public key infrastructure for financial services. Practices and policy framework |
| INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
| BS ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories |
| INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
| INCITS/ISO/IEC 11770-5 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
| DIN ISO 9735-10:2015-05 | Electronic data interchange for administration, commerce and transport (EDIFACT) - Application level syntax rules (Syntax version number: 4, Syntax release number: 2) - Part 10: Syntax service directories (ISO 9735-10:2014) |
| EN ISO 24534-4:2010 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
| IEEE 1363.2 : 2008 | SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES |
| I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
| S.R. CEN/TS 15480-2:2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
| ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
| BS ISO 16609:2012 | Financial services. Requirements for message authentication using symmetric techniques |
| BS IEC 61691-1-1:2011 | Behavioural languages VHDL Language reference manual |
| ISO/IEC 25185-1:2016 | Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity |
| IEC 61691-1-1:2011 | Behavioural languages - Part 1-1: VHDL Language Reference Manual |
| ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
| CEN/TS 16702-2:2015 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
| CEN/TS 15130:2006 | Postal services - DPM infrastructure - Messages supporting DPM applications |
| CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
| IEC 62320-2:2016 RLV | Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results |
| EN 61162-460:2015 | Maritime navigation and radiocommunication equipment and systems - Digital interfaces - Part 460: Multiple talkers and multiple listeners - Ethernet interconnection - Safety and security |
| EN 62940:2017 | Maritime navigation and radiocommunication equipment and systems - Integrated communication system (ICS) - Operational and performance requirements, methods of testing and required test results |
| EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| CEN/TS 15480-2:2012 | Identification card systems - European Citizen Card - Part 2: Logical data structures and security services |
| 17/30337383 DC : 0 | BS ISO/IEC 14888-3 AMD1 - INFORMATION SECURITY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
| ISO/IEC 11770-5:2011 | Information technology — Security techniques — Key management — Part 5: Group key management |
| 08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
| 09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| 10/30192164 DC : DRAFT JUNE 2010 | BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
| S.R. CEN/TS 16702-2:2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
| DD CEN/TS 15130:2006 | Postal services. DPM infrastructure. Messages supporting DPM applications |
| 10/30228327 DC : 0 | BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
| 12/30259506 DC : DRAFT JAN 2012 | BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
| 16/30288045 DC : 0 | BS ISO/IEC 20009-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
| PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
| S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
| BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
| 04/30105372 DC : DRAFT DEC 2004 | ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
| DD CEN/TS 15480-2:2007 | Identification card systems. European Citizen Card Logical data structures and card services |
| INCITS/ISO/IEC 18033-2 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
| ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
| BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
| BS ISO/IEC 18013-3:2017 | Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
| ISO/IEC 9834-8:2014 | Information technology — Procedures for the operation of object identifier registration authorities — Part 8: Generation of universally unique identifiers (UUIDs) and their use in object identifiers |
| BS EN ISO 24534-4:2010+A1:2019 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
| ISO/IEC 29500-1:2016 | Information technology — Document description and processing languages — Office Open XML File Formats — Part 1: Fundamentals and Markup Language Reference |
| PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO 21188:2018 | Public key infrastructure for financial services — Practices and policy framework |
| ISO/IEC 11889-1:2015 | Information technology — Trusted platform module library — Part 1: Architecture |
| ISO/IEC 13888-3:2009 | Information technology — Security techniques — Non-repudiation — Part 3: Mechanisms using asymmetric techniques |
| ISO/IEC 11889-2:2015 | Information technology — Trusted Platform Module Library — Part 2: Structures |
| IEC 62530:2011 | SystemVerilog - Unified Hardware Design, Specification, and Verification Language |
| NEMA PS3.3 : 2017A | DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 3: INFORMATION OBJECT DEFINITIONS |
| NEMA PS 3.15 : 2017A | DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 15: SECURITY AND SYSTEM MANAGEMENT PROFILES |
| IEEE 1800-2012 | IEEE Standard for SystemVerilog--Unified Hardware Design, Specification, and Verification Language |
| 04/30040717 DC : DRAFT JUL 2004 | ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
| 08/30135059 DC : 0 | ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) |
| 17/30281253 DC : 0 | BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
| 16/30346333 DC : 0 | BS EN 61162-460 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS -DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY |
| BS ISO/IEC 17960:2015 | Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
| PD CEN/TS 16702-2:2015 | Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
| BS ISO/IEC 13888-3:1997 | Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques |
| 15/30286868 DC : 0 | BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
| BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
| 07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
| 17/30345248 DC : 0 | BS ISO/IEC 9798-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
| 12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| 08/30180103 DC : DRAFT MAR 2008 | BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
| BS ISO/IEC 20009-4:2017 | Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets |
| PD CEN/TS 15480-3:2014 | Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface |
| 14/30302807 DC : 0 | BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
| 04/30040736 DC : DRAFT DEC 2004 | ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION |
| INCITS/ISO/IEC 18031 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
| BS ISO/IEC 14888-3 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
| BS ISO/IEC 25185-1:2016 | Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity |
| 07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
| BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
| BS EN ISO 12855:2015 | Electronic fee collection. Information exchange between service provision and toll charging |
| ISO/IEC 29167-17:2015 | Information technology — Automatic identification and data capture techniques — Part 17: Crypto suite cryptoGPS security services for air interface communications |
| ISO/IEC 18013-3:2017 | Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
| BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
| ISO 15764:2004 | Road vehicles — Extended data link security |
| I.S. EN 61162-460:2015 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY |
| BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| I.S. CEN TS 15130:2006 | POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS |
| S.R. CWA 16926-65:2015 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.20 (CWA 16374) TO VERSION 3.30 (THIS CWA) - PROGRAMMER'S REFERENCE |
| ISO/IEC 18031:2011 | Information technology — Security techniques — Random bit generation |
| S.R. CEN/TS 15480-3:2014 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
| S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
| ISO/IEC 29500-4:2016 | Information technology — Document description and processing languages — Office Open XML File Formats — Part 4: Transitional Migration Features |
| BS ISO/IEC 11770-4:2017 | Information technology. Security techniques. Key management Mechanisms based on weak secrets |
| ISO/IEC 17960:2015 | Information technology — Programming languages, their environments and system software interfaces — Code signing for source code |
| ISO 24534-4:2010 | Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
| ISO 15782-1:2009 | Certificate management for financial services — Part 1: Public key certificates |
| ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
| ISO/TR 14742:2010 | Financial services — Recommendations on cryptographic algorithms and their use |
| ISO/IEC 9797-2:2011 | Information technology — Security techniques — Message Authentication Codes (MACs) — Part 2: Mechanisms using a dedicated hash-function |
| I.S. EN 62320-2:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS |
| ISO/TS 19299:2015 | Electronic fee collection — Security framework |
| IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
| CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ONORM ONR CEN/TS 16702-2 : 2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER (CEN/TS 16702-2:2015) |
| EN 62320-2:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016) |
| INCITS/ISO/IEC 11889-4 : 2009(R2014) | INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS |
| DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
| 14/30302798 DC : 0 | BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
| BS ISO/IEC 11770-5:2011 | Information technology Security techniques. Key management Group key management |
| BS ISO/IEC 11889-4:2009 | Information technology. Trusted platform module Commands |
| 05/30092187 DC : DRAFT APR 2005 | ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
| ECMA 376 : 5ED 2015 | OFFICE OPEN XML FILE FORMATS - PART 1: FUNDAMENTALS AND MARKUP LANGUAGE REFERENCE - PART 2: OPEN PACKAGING CONVENTIONS - PART 3: MARKUP COMPATIBILITY AND EXTENSIBILITY - PART 4: TRANSITIONAL MIGRATION FEATURES |
| BS ISO 15782-1:2009 | Certificate management for financial services Public key certificates |
| BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
| ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
| BS ISO/IEC 11889-2:2009 | Information technology. Trusted platform module Design principles |
| 10/30237107 DC : DRAFT DEC 2010 | BS ISO/IEC 11770-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
| DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
| BS EN 61162-460:2015 | Maritime navigation and radiocommunication equipment and systems. Digital interfaces Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security |
| 14/30302801 DC : 0 | BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
| PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
| 16/30329503 DC : 0 | BS ISO 19847 - SHIPS AND MARINE TECHNOLOGY - SHIPBOARD DATA SERVERS TO SHARE FIELD DATA AT SEA |
| 04/30093313 DC : DRAFT JUN 2004 | ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
| 16/30335688 DC : 0 | BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| ISO/IEC 13157-4:2016 | Information technology — Telecommunications and information exchange between systems — NFC Security — Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
| ISO/IEC TR 14516:2002 | Information technology — Security techniques — Guidelines for the use and management of Trusted Third Party services |
| S.R. CWA 16926-6:2015 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE |
| ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
| ISO/IEC 14543-5-1:2010 | Information technology — Home electronic system (HES) architecture — Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 — Core protocol |
| ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
| IEC PAS 63062:2016 | Maritime navigation and radiocommunication equipment and systems - Removable external data source (REDS) - General requirements, methods of testing and required test results |
| I.S. EN ISO 24534-4:2010/A1:2019 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
| ISO/IEC 11889-4:2015 | Information technology — Trusted Platform Module Library — Part 4: Supporting Routines |
| I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
| ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
| IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
| EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| ISO 12855:2015 | Electronic fee collection — Information exchange between service provision and toll charging |
| IEC 62320-2:2016 | Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results |
| EN ISO 12855:2015 | Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
| INCITS/ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
| BS ISO/IEC 11889-1:2009 | Information technology. Trusted platform module Overview |
| BS EN 62320-2:2017 | Maritime navigation and radiocommunication equipment and systems. Automatic identification system (AIS) AIS AtoN Stations. Operational and performance requirements, methods of testing and required test results |
| BS ISO/IEC 9798-5:2009 | Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques |
| BS IEC 62530:2011 | SystemVerilog. Unified hardware design, specification, and verification language |
| DD CEN/TS 15480-3:2010 | Identification card systems. European citizen card European citizen card interoperability using an application interface |
| 06/30108755 DC : DRAFT FEB 2006 | ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL |
| BS ISO/IEC 14888-1:1998 | Information technology. Security techniques. Digital signatures with appendix General |
| ISO/IEC 11770-4:2017 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets |
| DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
| PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
| BS ISO/IEC 18033-2 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
| INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
| BS ISO/IEC 9797-2:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
| 09/30199552 DC : DRAFT FEB 2009 | BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
| BS EN 62940:2017 | Maritime navigation and radiocommunication equipment and systems. Integrated communication system (ICS). Operational and performance requirements, methods of testing and required test results |
| 07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
| 07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
| IEEE DRAFT 1363 : D13 99 | DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY |
| INCITS/ISO/IEC 11770-4 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
| ISO/IEC 20009-4:2017 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets |
| ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
| ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories |
| ISO/IEC TR 29149:2012 | Information technology — Security techniques — Best practices for the provision and use of time-stamping services |
| EN 62320-2:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016) |
| CEN/TS 15480-3:2014 | Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |
| CEN/TS 16439:2013 | Electronic fee collection - Security framework |
| UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
| UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
| UNE-EN ISO 24534-4:2012 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
| CEI UNI ISO/IEC 18013-3 : 2011 | INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
| INCITS/ISO/IEC 29192-4:2013(R2019) | Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques |
| INCITS/ISO/IEC 15444-8:2007[R2019] | Information technology - JPEG 2000 image coding system: Secure JPEG 2000<br> |
| ANSI X9.79-1 : 2001 | FINANCIAL SERVICES PUBLIC KEY INFRASTRUCTURE - PART 1: PKI PRACTICES AND POLICY FRAMEWORK |
| AS ISO/IEC 9797.2:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
| ISO/IEC 10118-1:2016 | Information technology — Security techniques — Hash-functions — Part 1: General |
Access your standards online with a subscription
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.