JTC 1/SC 27/WG 2: Cryptography and security mechanisms

Search Results

  1. HISTORICAL

    ISO/IEC 10118-1:2000

    This document has been replaced. View the most recent version.

    Information technology -- Security techniques -- Hash-functions -- Part 1: General

    standard by International Organization for Standardization/International Electrotechnical Commission, 06/15/2000.

    Languages: English

    Historical Editions: ISO/IEC 10118-1:2016

  2. HISTORICAL

    ISO/IEC 10118-2:2000

    This document has been replaced. View the most recent version.

    Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher

    standard by International Organization for Standardization/International Electrotechnical Commission, 12/15/2000.

    Languages: English

    Corrigenda: ISO/IEC 10118-2/Cor2:2007ISO/IEC 10118-2/Cor1:2006

    Historical Editions: ISO/IEC 10118-2:2010ISO/IEC 10118-2 Ed. 1.0 en CORR2:2007

  3. MOST RECENT

    ISO/IEC 10118-4:1998

    Information technology - Security techniques - Hash-functions - Part 4: Hash-functions using modular arithmetic

    standard by International Organization for Standardization/International Electrotechnical Commission, 12/01/1998.

    Languages: English

    Amendments, rulings, and supplements: ISO/IEC 10118-4:1998/Amd1:2014

    Corrigenda: ISO/IEC 10118-4:1998/Cor1:2014

    Historical Editions: ISO/IEC 10118-4:1998/Cor1:2014

  4. HISTORICAL

    ISO/IEC 13888-2:1998

    This document has been replaced. View the most recent version.

    Information technology - Security techniques - Non-repudiation - Part 2: Mechanisms using symmetric techniques (publiÇ en anglais seulement)

    standard by International Organization for Standardization/International Electrotechnical Commission, 04/01/1998.

    Languages: English

    Historical Editions: ISO/IEC 13888-2:2010/Cor1:2012ISO/IEC 13888-2:2010

  5. HISTORICAL

    ISO/IEC 13888-3:1997

    This document has been replaced. View the most recent version.

    Information technology - Security techniques - Non-repudiation - Part 3: Mechanisms using asymmetric techniques

    standard by International Organization for Standardization/International Electrotechnical Commission, 12/01/1997.

    Languages: English

    Historical Editions: ISO/IEC 13888-3:2020ISO/IEC 13888-3:2009

  6. HISTORICAL

    ISO/IEC 9797-1:1999

    This document has been replaced. View the most recent version.

    Information technology -- Security techniques -- Message Authentication Codes (MACs) -- Part 1: Mechanisms using a block cipher

    standard by International Organization for Standardization/International Electrotechnical Commission, 12/01/1999.

    Languages: English

    Historical Editions: ISO/IEC 9797-1:2011

  7. HISTORICAL

    ISO/IEC 9798-2:1999

    This document has been replaced. View the most recent version.

    Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms

    standard by International Organization for Standardization/International Electrotechnical Commission, 07/01/1999.

    Languages: English

    Corrigenda: ISO/IEC 9798-2/Cor1:2004ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004

    Historical Editions: ISO/IEC 9798-2:2019ISO/IEC 9798-2 Ed. 1.0 en CORR2:2012ISO/IEC 9798-2 Ed. 1.0 en CORR1:2010ISO/IEC 9798-2:2008ISO/IEC 9798-2:2008/Cor3:2013ISO/IEC 9798-2 Ed. 1.0 en CORR1:2004

  8. MOST RECENT

    ISO/IEC 9798-4:1999

    Information technology -- Security techniques -- Entity authentication -- Part 4: Mechanisms using a cryptographic check function

    standard by International Organization for Standardization/International Electrotechnical Commission, 12/01/1999.

    Languages: English

    Corrigenda: ISO/IEC 9798-4/Cor2:2012ISO/IEC 9798-4 Ed. 1.0 en CORR2:2012ISO/IEC 9798-4/Cor1:2009ISO/IEC 9798-4 Ed. 1.0 en CORR1:2009