The present document defines a list of approved cryptographic algorithms combined with the requirements on their parameters, as well as the approved combinations of algorithms in the form of "signature suites". The approved algorithms and parameters shall be referenced in the corresponding Protection Profiles (e.g. for SSCDs or trusted CSP components).
PUBLISHED
SRPS ETSI SR 002 176 V1.1.1:2012
60.60
Standard published
Feb 29, 2012