BS EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Introduction and common definitions |
BS ISO/IEC 9796-3:2006
|
Information technology. Security techniques. Digital signature schemes giving message recovery Discrete logarithm based mechanisms |
I.S. EN 419212-2:2017
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
I.S. EN 419212-1:2017
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
12/30236955 DC : 0
|
BS ISO/IEC 20008-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS DIGITAL SIGNATURE - PART 2: MECHANISMS USING A GROUP PUBLIC KEY |
12/30255296 DC : DRAFT MAR 2012
|
BS EN 14890-2 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 2: ADDITIONAL SERVICES |
BS ISO/IEC 18370-2:2016
|
Information technology. Security techniques. Blind digital signatures Discrete logarithm based mechanisms |
15/30318285 DC : 0
|
BS ISO/IEC 15946-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 1: GENERAL |
BS ISO/IEC 15946-1:2016
|
Information technology. Security techniques. Cryptographic techniques based on elliptic curves General |
ISO/IEC 18370-2:2016
|
Information technology Security techniques Blind digital signatures Part 2: Discrete logarithm based mechanisms |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
ISO/IEC 11889-1:2015
|
Information technology Trusted platform module library Part 1: Architecture |
12/30255293 DC : 0
|
BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
16/30345808 DC : 0
|
BS EN 419212-1 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
BS ISO/IEC 20008-2:2013
|
Information technology. Security techniques. Anonymous digital signatures Mechanisms using a group public key |
UNI EN 419212-1 : 2015
|
APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
PREN 419212-1 : DRAFT 2016
|
APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 1: INTRODUCTION AND COMMON DEFINITIONS |
14/30302798 DC : 0
|
BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
BS EN 419212-2:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services Signature and Seal Services |
16/30345811 DC : 0
|
BS EN 419212-2 - APPLICATION INTERFACE FOR SECURE ELEMENTS FOR ELECTRONIC IDENTIFICATION, AUTHENTICATION AND TRUSTED SERVICES - PART 2: SIGNATURE AND SEAL SERVICES |
ISO/IEC 9796-3:2006
|
Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms |
EN 419212-1:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 1: Introduction and common definitions |
EN 419212-2:2017
|
Application Interface for Secure Elements for Electronic Identification, Authentication and Trusted Services - Part 2: Signature and Seal Services |
BS ISO/IEC 11889-1:2009
|
Information technology. Trusted platform module Overview |
ISO/IEC 20008-2:2013
|
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key |
15/30268565 DC : 0
|
BS ISO/IEC 18370-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - BLIND DIGITAL SIGNATURES - PART 2: DISCRETE LOGARITHM BASED MECHANISMS |
CAN/CSA-ISO/IEC 15946-1:18
|
Information technology - Security techniques - Cryptographic techniques based on elliptic curves - Part 1: General (Adopted ISO/IEC 15946-1:2016, third edition, 2016-07-01) |
CAN/CSA-ISO/IEC 11889-1:16
|
Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15) |
ISO/IEC 15946-1:2016
|
Information technology Security techniques Cryptographic techniques based on elliptic curves Part 1: General |