Search Serbian, European and international standards. Identify the standard organization, select the standard number or keyword, and complete the search you want. You can also add a standard drafting stage or a committee / national committee that drafted the standard
Information technology — Security techniques — Requirements for partially anonymous, partially unlinkable authentication.
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 1: General
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 1: General — Amendment 1
60.60 Standard published
Information security — Lightweight cryptography — Part 2: Block ciphers
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 3: Stream ciphers
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques
90.93 Standard confirmed
Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques — Amendment 1
60.60 Standard published
Information technology — Security techniques — Lightweight cryptography — Part 5: Hash-functions
90.93 Standard confirmed
Information technology — Lightweight cryptography — Part 6: Message authentication codes (MACs)
90.93 Standard confirmed
Information security — Lightweight cryptography — Part 7: Broadcast authentication protocols
90.93 Standard confirmed
Information security — Lightweight cryptography — Part 8: Authenticated encryption
60.60 Standard published
Information Technology — Security Techniques — Physical Security Attacks, Mitigation Techniques and Security Requirements
90.93 Standard confirmed
Information technology — Security techniques — Vulnerability handling processes
90.92 Standard to be revised
Information technology — Internet of things — Methodology for trustworthiness of IoT system/service
90.92 Standard to be revised
Information security — Secure multiparty computation — Part 1: General
60.60 Standard published
Information security — Secure multiparty computation — Part 2: Mechanisms based on secret sharing
60.60 Standard published
Information security, cybersecurity and privacy protection — Hardware monitoring technology for hardware security assessment
60.60 Standard published
Cybersecurity — Multi-party coordinated vulnerability disclosure and handling
60.60 Standard published