Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1
30.60 Close of voting/ comment period
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 1: Introduction and general model
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 2: Security functional components
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 3: Security assurance components
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 4: Framework for the specification of evaluation methods and activities
40.60 Close of voting
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Part 5: Pre-defined packages of security requirements
40.60 Close of voting
Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers — Amendment 2
40.60 Close of voting
Information security — Encryption algorithms — Part 7: Tweakable block ciphers — Amendment 1
30.20 CD study/ballot initiated
Information security, cybersecurity and privacy protection — Evaluation criteria for IT security — Requirements and methodology for IT security evaluation
40.60 Close of voting
Information security, cybersecurity and privacy protection — General principles, requirements and guidance for security evaluation of biometric systems
60.00 Standard under publication
Information technology — Conformance test methods for security service crypto suites — Part 10: Crypto suite AES-128
40.99 Full report circulated: DIS approved for registration as FDIS
Information technology — Conformance test methods for security service crypto suites — Part 11: Crypto suite PRESENT-80
50.00 Final text received or FDIS registered for formal approval
Information technology — Conformance test methods for security service crypto suites — Part 13: Cryptographic Suite Grain-128A
40.99 Full report circulated: DIS approved for registration as FDIS
Information technology — Conformance test methods for security service crypto suites — Part 16: Crypto suite ECDSA-ECDH
40.99 Full report circulated: DIS approved for registration as FDIS
Information technology — Conformance test methods for security service crypto suites — Part 21: Crypto suite SIMON
40.99 Full report circulated: DIS approved for registration as FDIS
Information technology — Conformance test methods for security service crypto suites — Part 22: Crypto suite SPECK
40.99 Full report circulated: DIS approved for registration as FDIS
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 1: Overview and concepts
40.60 Close of voting
Information security, cybersecurity and privacy protection — Requirements for the competence of IT security conformance assessment body personnel — Part 2: Knowledge and skills requirements for ISO/IEC 19790 testers and validators
40.60 Close of voting