Use the form below to find the searched projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”.
Grain-oriented electrical steel strip and sheet delivered in the fully processed state
60.60 Standard published
Round steel rod for cold heading and cold extrusion - Dimensions and tolerances
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 1: General guidance for arc welding
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 2: Arc welding of ferritic steels
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 2: Arc welding of ferritic steels
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 4: Arc welding of aluminium and aluminium alloys
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 4: Arc welding of aluminium and aluminium alloys
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 5: Welding of clad steel
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 7: Electron beam welding
60.60 Standard published
Welding - Recommendations for welding of metallic materials - Part 8: Welding of cast irons
60.60 Standard published
Continuously hot rolled low carbon steel sheet and strip for cold forming - Technical delivery conditions
60.60 Standard published
Metallic materials - Sheet and strip - Determination of plastic strain ratio (ISO 10113:2006, Corrected version 2007-08-01)
60.60 Standard published
Information technology — Security techniques — Modes of operation for an n-bit block cipher
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 1: General
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
60.60 Standard published
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
60.60 Standard published