Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information security — Lightweight cryptography — Part 2: Block ciphers
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1
60.60 Standard published
Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions
90.93 Standard confirmed
Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)
90.93 Standard confirmed
Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols
90.93 Standard confirmed
Information security — Lightweight cryptography — Part 8: Authenticated encryption
60.60 Standard published
Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements
90.20 Standard under periodical review
Information technology — Security techniques — Vulnerability handling processes
90.93 Standard confirmed
Information technology — Internet of things — Methodology for trustworthiness of IoT system/service
60.60 Standard published
Information security — Secure multiparty computation — Part 1: General
60.60 Standard published
Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing
60.60 Standard published
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
60.60 Standard published
Cybersecurity — Multi-party coordinated vulnerability disclosure and handling
60.60 Standard published
Cybersecurity — Security considerations throughout the product life cycle
60.60 Standard published
Information technology — Security techniques — Check character systems
90.93 Standard confirmed
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Patch Management Extension for the ISO/IEC 15408 series and ISO/IEC 18045
60.60 Standard published