Use the form below to find the searched projects. Enter your criteria for searching (single or in combination) in the fields below and press the button “Search”.
Information technology -- Security techniques -- Guidelines for the assessment of information security controls
60.60 Standard published
Information technology — Security techniques — Modes of operation for an n-bit block cipher
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 1: General
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 2: Hash-functions using an n-bit block cipher
60.60 Standard published
IT Security techniques — Hash-functions — Part 3: Dedicated hash-functions
60.60 Standard published
Information technology — Security techniques — Hash-functions — Part 4: Hash-functions using modular arithmetic
60.60 Standard published
Information technology — Security techniques — Key management — Part 1: Framework
60.60 Standard published
IT Security techniques — Key management — Part 2: Mechanisms using symmetric techniques
60.60 Standard published
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques
60.60 Standard published
Information technology — Security techniques — Key management — Part 3: Mechanisms using asymmetric techniques — Amendment 1: Blinded Diffie-Hellman key agreement
60.60 Standard published
Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets
60.60 Standard published
Information security — Key management — Part 5: Group key management
60.60 Standard published
Information technology — Security techniques — Key management — Part 6: Key derivation
60.60 Standard published
Security aspects - Guidelines for their inclusion in publications
60.60 Standard published
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 1: Introduction and general model (ISO/IEC 15408-1:2022)
60.60 Standard published
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
60.60 Standard published
Information security, cybersecurity and privacy protection - Evaluation criteria for IT security - Part 2: Security functional components (ISO/IEC 15408-2:2022)
60.60 Standard published
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
60.60 Standard published