ISO/IEC 18031:2011
|
Information technology Security techniques Random bit generation |
ISO/IEC 9798-3:1998
|
Information technology Security techniques Entity authentication Part 3: Mechanisms using digital signature techniques |
ISO/IEC 14888-3:2016
|
Information technology Security techniques Digital signatures with appendix Part 3: Discrete logarithm based mechanisms |
ISO/TR 19038:2005
|
Banking and related financial services Triple DEA Modes of operation Implementation guidelines |
ISO 11568-2:2012
|
Financial services — Key management (retail) — Part 2: Symmetric ciphers, their key management and life cycle |
ISO 8372:1987
|
Information processing Modes of operation for a 64-bit block cipher algorithm |
ISO/IEC 11770-2:2008
|
Information technology Security techniques Key management Part 2: Mechanisms using symmetric techniques |
ISO/IEC 10118-4:1998
|
Information technology Security techniques Hash-functions Part 4: Hash-functions using modular arithmetic |
ISO/IEC 18033-2:2006
|
Information technology Security techniques Encryption algorithms Part 2: Asymmetric ciphers |
ISO/IEC 18033-3:2010
|
Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
ISO/IEC 9796-3:2006
|
Information technology Security techniques Digital signature schemes giving message recovery Part 3: Discrete logarithm based mechanisms |
ISO/IEC 9798-4:1999
|
Information technology Security techniques Entity authentication Part 4: Mechanisms using a cryptographic check function |
ISO 16609:2012
|
Financial services — Requirements for message authentication using symmetric techniques |
ANSI X9.24-1 : 2017
|
RETAIL FINANCIAL SERVICES - SYMMETRIC KEY MANAGEMENT - PART 1: USING SYMMETRIC TECHNIQUES |
ISO/IEC 9798-2:2008
|
Information technology Security techniques Entity authentication Part 2: Mechanisms using symmetric encipherment algorithms |
ISO/IEC 9798-5:2009
|
Information technology Security techniques Entity authentication Part 5: Mechanisms using zero-knowledge techniques |
ISO 11568-1:2005
|
Banking — Key management (retail) — Part 1: Principles |
ISO/IEC 9796-2:2010
|
Information technology Security techniques Digital signature schemes giving message recovery Part 2: Integer factorization based mechanisms |
ISO/IEC 9798-6:2010
|
Information technology Security techniques Entity authentication Part 6: Mechanisms using manual data transfer |
FIPS PUB 186 : 0
|
DIGITAL SIGNATURE STANDARD (DSS) |
ISO/IEC 9797-1:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004
|
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ANSI INCITS 92 : 1981
|
DATA ENCRYPTION ALGORITHM |
ISO 9564-2:2014
|
Financial services Personal Identification Number (PIN) management and security Part 2: Approved algorithms for PIN encipherment |
ISO 11568-4:2007
|
Banking — Key management (retail) — Part 4: Asymmetric cryptosystems — Key management and life cycle |
ISO/IEC 10118-2:2010
|
Information technology Security techniques Hash-functions Part 2: Hash-functions using an n-bit block cipher |
ISO/IEC 9797-2:2011
|
Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
ISO/IEC 10116:2017
|
Information technology — Security techniques — Modes of operation for an n-bit block cipher |
ISO/IEC 14888-2:2008
|
Information technology Security techniques Digital signatures with appendix Part 2: Integer factorization based mechanisms |
TS 102 176-1 : 2.1.1
|
ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES; PART 1: HASH FUNCTIONS AND ASYMMETRIC ALGORITHMS |
ISO/IEC 18033-4:2011
|
Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers |
ISO/IEC 11770-3:2015
|
Information technology Security techniques Key management Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 9798-1:2010
|
Information technology Security techniques Entity authentication Part 1: General |