Phone: (011) 7541-421, 3409-301, 3409-335, 6547-293, 3409-310
E-mail: Standards sales: prodaja@iss.rs Education: iss-edukacija@iss.rs Information about standards: infocentar@iss.rs
Stevana Brakusa 2, 11030 Beograd
Main menu

Projects

Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 2: Integer factorization based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Digital signature schemes giving message recovery — Part 3: Discrete logarithm based mechanisms

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 1: Mechanisms using a block cipher — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information security — Message authentication codes (MACs) — Part 2: Mechanisms using a dedicated hash-function — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Message Authentication Codes (MACs) — Part 3: Mechanisms using a universal hash-function — Amendment 1

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 1: General

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

IT Security techniques — Entity authentication — Part 2: Mechanisms using authenticated encryption

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

IT Security techniques — Entity authentication — Part 3: Mechanisms using digital signature techniques

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 1

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 4: Mechanisms using a cryptographic check function — Technical Corrigendum 2

60.60 Standard published

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques

90.92 Standard to be revised

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Entity authentication — Part 6: Mechanisms using manual data transfer

90.93 Standard confirmed

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 1

20.00 New project registered in TC/SC work programme

ISO/IEC JTC 1/SC 27 more

Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms — Amendment 2

20.00 New project registered in TC/SC work programme

ISO/IEC JTC 1/SC 27 more