SNo |
IS Number |
Title |
Technical Committee |
1 |
IS/ISO/IEC 9796 : PART 2 : 2010 |
Information technology - Security techniques - Digital signature schemes g4ing message recovery: Part 2 integer factorization based mechanisms (First Revision) |
LITD 17 |
2 |
IS/ISO/IEC 9796 : Part 3 : 2006 |
Information technology - Security techniques - Digital signature schemes giving message recovery: Part 3 discrete logarithm based mechanisms |
LITD 17 |
3 |
IS/ISO/IEC 11770 : Part 2 : 2018 |
IT Security Techniques — Key Management Part 2 Mechanisms Using Symmetric Techniques ( First Revision ) |
LITD 17 |
4 |
IS/ISO/IEC 11770 : Part 3 : 2015 |
Information technology - Security techniques - Key management: Part 3 mechanisms using asymmetric techniques (First Revision) |
LITD 17 |
5 |
IS/ISO/IEC 11770-4 : 2017 |
Information technology - Security techniques - Key management: Part 4 mechanisms based on weak: Secrets (First Revision) |
LITD 17 |
6 |
IS/ISO/IEC 14888 : Part 1 : 2008 |
Information technology - Security techniques - Digital signatures with appendix: Part 1 general |
LITD 17 |
7 |
IS/ISO/IEC 14888 : Part 2 : 2008 |
Information technology - Security techniques - digital signatures with appendix: Part 2 integer factorization based mechanisms |
LITD 17 |
8 |
IS/ISO/IEC 14888 : Part 3 : 2018 |
IT Security Techniques — Digital Signatures with Appendix Part 3 Discrete Logarithm Based Mechanisms ( First Revision ) |
LITD 17 |
9 |
IS/ISO/IEC 15946 : Part 1 : 2016 |
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General |
LITD 17 |
10 |
IS/ISO/IEC 18031 : 2011 |
Information technology - Security techniques - Random bit generation |
LITD 17 |
11 |
IS/ISO/IEC 18033 : Part 2 : 2006 |
Information Technology - Security Techniques - Encryption Algorithms Part 2 Asymmetric Ciphers |
LITD 17 |
12 |
IS/ISO/IEC 18033 : Part 3 : 2010 |
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers |
LITD 17 |
13 |
IS/ISO/IEC 18033 : Part 4 : 2011 |
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers |
LITD 17 |