CSA ISO/IEC 10116 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
15/30288056 DC : 0
|
BS ISO/IEC 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
BS ISO 13008:2012
|
Information and documentation — Digital records conversion and migration process |
INCITS/ISO/IEC 18033-3 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS |
TS 103 532 : 1.1.1
|
CYBER; ATTRIBUTE BASED ENCRYPTION FOR ATTRIBUTE BASED ACCESS CONTROL |
CSA ISO/IEC 9798-5 : 2010 : R2015
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
10/30201931 DC : 0
|
BS ISO 13008 - INFORMATION AND DOCUMENTATION - DIGITAL RECORDS CONVERSION AND MIGRATION PROCESS |
CSA ISO/IEC 10116 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CSA ISO/IEC 11770-4 : 2007 : R2017
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 10116 : 2007 : INC : COR 1 : 2009
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
INCITS/ISO/IEC 11770-4 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
INCITS/ISO/IEC 29192-3 : 2014
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 3: STREAM CIPHERS |
CAN/CSA-ISO/IEC 18033-2:06 (R2016)
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 9798-5 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
BS ISO/IEC 18033-4 : 2005
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
I.S. EN 62734:2015
|
INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
IEC TS 62351-2:2008
|
Power systems management and associated information exchange - Data and communications security - Part 2: Glossary of terms |
EN 62734:2015
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CSA ISO/IEC 18033-2 :2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
04/30062952 DC : DRAFT MAR 2004
|
ISO/IEC FCD 10116 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER ALGORITHM |
10/30192164 DC : DRAFT JUNE 2010
|
BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
BS ISO/IEC 18033-3:2010
|
Information technology. Security techniques. Encryption algorithms Block ciphers |
CSA ISO/IEC 18033-3:2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS |
CAN/CSA-ISO/IEC 18031:13 (R2017)
|
Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
CSA ISO/IEC 10116 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
INCITS/ISO/IEC 18033-2 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
BS ISO/IEC 18031 : 2011
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
ISO/IEC 29150:2011
|
Information technology — Security techniques — Signcryption |
CEN/TS 16702-1:2014
|
Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
04/30040717 DC : DRAFT JUL 2004
|
ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
17/30281253 DC : 0
|
BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
BS ISO/IEC 29192-2:2012
|
Information technology. Security techniques. Lightweight cryptography Block ciphers |
ISO/IEC 9798-5:2009
|
Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
04/30040721 DC : DRAFT JUL 2004
|
ISO/IEC 18033-3 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 3: BLOCK CIPHERS |
07/30163724 DC : 0
|
BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
10/30204792 DC : 0
|
BS ISO/IEC 18033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
PD CEN/TS 16702-1:2014
|
Electronic fee collection. Secure monitoring for autonomous toll system Compliance checking |
08/30180103 DC : DRAFT MAR 2008
|
BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
18/30354751 DC : DRAFT FEB 2018
|
BS ISO/IEC 18033-6 - INFORMATION TECHNOLOGY SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 6: HOMOMORPHIC ENCRYPTION |
BS ISO/IEC 18033-5:2015
|
Information technology. Security techniques. Encryption algorithms Identity-based ciphers |
BS ISO/IEC 29150:2011
|
Information technology. Security techniques. Signcryption |
CSA ISO/IEC 18033-4 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
CAN/CSA-ISO/IEC 18033-3:12 (R2016)
|
Information technology - Security techniques - Encryption algorithms - Part 3: Block ciphers (Adopted ISO/IEC 18033-3:2010, second edition, 2010-12-15) |
BS EN 62734:2015
|
Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CSA ISO/IEC 18031 : 2013
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
S.R. CEN/TS 16702-1:2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
ISO/IEC 29192-3:2012
|
Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers |
ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
ISO/IEC 29192-2:2012
|
Information technology Security techniques Lightweight cryptography Part 2: Block ciphers |
BS ISO/IEC 10116:2017
|
Information technology. Security techniques. Modes of operation for an n-bit block cipher |
ISO/IEC 18033-4:2011
|
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
IEC 62734:2014
|
Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
07/30154069 DC : 0
|
BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
BIS IS/ISO 21188 : 2006
|
PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
BS ISO 21188:2006
|
Public key infrastructure for financial services. Practices and policy framework |
UNI CEN/TS 16702-1 : 2014
|
ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 1: COMPLIANCE CHECKING |
BS ISO/IEC 29192-3:2012
|
Information technology. Security techniques. Lightweight cryptography Stream ciphers |
INCITS/ISO/IEC 18031 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
DD IEC/TS 62351-2:2008
|
Power systems management and associated information exchange. Data and communications security Glossary of terms |
ANSI INCITS 422 : 2007
|
APPLICATION PROFILE FOR COMMERCIAL BIOMETRIC PHYSICAL ACCESS CONTROL |
CSA ISO/IEC 11770-4 : 2007
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
INCITS/ISO/IEC 10116 : 2008
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MODES OF OPERATION FOR AN N-BIT BLOCK CIPHER |
CAN/CSA-ISO/IEC 18033-4:13 (R2017)
|
Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers (Adopted ISO/IEC 18033-4:2011, second edition, 2011-12-15) |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 : R2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
UNI ISO 13008 : 2014
|
INFORMATION AND DOCUMENTATION - DIGITAL RECORDS CONVERSION AND MIGRATION PROCESS |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 18033-5:2015
|
Information technology Security techniques Encryption algorithms Part 5: Identity-based ciphers |
INCITS/ISO/IEC 18033-4 : 2012
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
ISO 13008:2012
|
Information and documentation — Digital records conversion and migration process |
ISO/IEC 19772:2009
|
Information technology Security techniques Authenticated encryption |
ISO/IEC 18033-3:2010
|
Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
05/30144066 DC : DRAFT DEC 2005
|
ISO 13492 - FINANCIAL SERVICES - KEY MANAGEMENT RELATED DATA ELEMENT - APPLICATION AND USAGE OF ISO 8353 DATA ELEMENTS 53 AND 96 |
INCITS/ISO/IEC 9798-5 : 2010
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
BS ISO/IEC 19772:2009
|
Information technology. Security techniques. Authenticated encryption |
BS ISO/IEC 9798-5:2009
|
Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques |
UNE-ISO 13008:2013
|
Information and documentation. Digital records conversion and migration process. |
14/30249464 DC : 0
|
BS ISO/IEC 18033-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 5: IDENTITY-BASED CIPHERS |
10/30228415 DC : DRAFT NOV 2010
|
BS ISO/IEC 29192-2 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 2: BLOCK CIPHERS |
04/30082429 DC : DRAFT JUL 2004
|
ISO/IEC 18033-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 4: STREAM CIPHERS |
BS ISO/IEC 18033-2 : 2006
|
INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
ISO/IEC 18033-2:2006
|
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
07/30105115 DC : 0
|
BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
ISO 21188:2018
|
Public key infrastructure for financial services — Practices and policy framework |