LITD 17-Information Systems Security And Privacy  Standards List


Aspect : Publication Date :


Total Standards :  114

Revised Standards    New Standards
S.No IS Number IS Title Amendment Reaffirmation Year Document Action
1 IS/ISO/IEC/TR 27039 : 2015
Reviewed In : 2024
ISO/IEC 27039:2015
Information Technology - Security Techniques - Selection, Deployment and Operations of Intrusion Detection Systems ( IDPS ) 0 Jun, 2024 Buy
2 IS/ISO/IEC 11770-1 : 2010
Reviewed In : 2023
ISO/IEC 11770-1:2010
Information technology - Security techniques - Key management: Part 1 framework 0 Mar, 2023 Buy
3 IS/ISO/IEC 11770-2 : 2018
Reviewed In : 2023
ISO/IEC 11770-2:2018
(First Revision)
IT Security Techniques — Key Management Part 2 Mechanisms Using Symmetric Techniques ( First Revision ) 0 Sep, 2023 Buy
4 IS/ISO/IEC 11770-3 : 2021
ISO 4628-10 : 2024

ISO 4628-10 : 2024
(Second Revision)
Information security Key management Part 3: Mechanisms using asymmetric techniques Second Revision 0 ---- Buy
5 IS/ISO/IEC 11770-4 : 2017
Reviewed In : 2022
ISO/IEC 11770-4:2017
(First Revision)
Information technology - Security techniques - Key management: Part 4 mechanisms based on weak: Secrets (First Revision) 2 May, 2022 Buy
6 IS/ISO/IEC 11770-5 : 2020
ISO 21561-2:2016

ISO 21561-2:2016
(First Revision)
INFORMATION SECURITY KEY MANAGEMENT PART 5: GROUP KEY MANAGEMENT (First Revision) 0 ---- Buy
7 IS/ISO/IEC 11770-6 : 2016
Reviewed In : 2023
ISO/IEC 11770-6:2016
Information Technology - Security Techniques - Key Management Part 6 Key Derivation 0 Jan, 2023 Buy
8 IS/ISO/IEC 11770-7 : 2021
12123

12123
Information security Key management Part 7: Cross-domain password-based authenticated key exchange 0 ---- Buy
9 IS/ISO/IEC 14888-1 : 2008
Reviewed In : 2022
ISO/IEC 14888-1:2008
Information technology - Security techniques - Digital signatures with appendix: Part 1 general 0 Jun, 2022 Buy
10 IS/ISO/IEC 14888-2 : 2008
Reviewed In : 2022
ISO/IEC 14888-2:2008
Information technology - Security techniques - digital signatures with appendix: Part 2 integer factorization based mechanisms 1 May, 2022 Buy
11 IS/ISO/IEC 14888-3 : 2018
Reviewed In : 2023
ISO/IEC 14888-3:2018
(First Revision)
IT Security Techniques — Digital Signatures with Appendix Part 3 Discrete Logarithm Based Mechanisms ( First Revision ) 0 Jan, 2023 Buy
12 IS 14990 (Part 1) : 2024


(Third Revision)
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 1: Introduction and General Model Third Revision 0 ---- Buy
13 IS 14990 (Part 2) : 2024


(Third Revision)
Information security cybersecurity and privacy protection Evaluation criteria for IT security Part 2: Security functional components Third Revision 0 ---- Buy
14 IS 14990 (Part 3) : 2024


(Third Revision)
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 3: Security Assurance Components Third Revision 0 ---- Buy
15 IS 14990 (Part 4) : 2024


Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 4: Framework for the Specification of Evaluation Methods and Activities 0 ---- Buy
16 IS 14990 (Part 5) : 2024


Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Part 5: Pre-defined Packages of Security Requirements 0 ---- Buy
17 IS 15116 : 2018
ISO/IEC 10116:2017
Reviewed In : 2021
ISO/IEC 10116:2017
(Second Revision)
Information technology - Security techniques - Modes of operation for an n - Bit block cipher (Second Revision) 1 Sep, 2021 Buy
18 IS/ISO/IEC/TR 15446 : 2017
Reviewed In : 2022
ISO/IEC TR 15446:2017
Information technology - Security techniques - Guidance for the production of protection profiles and Security targets 0 May, 2022 Buy
19 IS 15580 : 2012
ISO/IEC 21827:2008
Reviewed In : 2021
ISO/IEC 21827:2008
(First Revision)
Information technology - Security techniques - Systems: Security engineering - Capability maturity model® (SSE - CMM®) (First Revision) 0 Oct, 2021 Buy
20 IS 15671 : 2024


(Second Revision)
Information Security Cybersecurity and Privacy Protection Evaluation Criteria for IT Security Methodology for IT Security Evaluation Second Revision 0 ---- Buy
21 IS/ISO/IEC 15946-1 : 2016
Reviewed In : 2024
ISO/IEC 15946 -1 : 2016
Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves Part 1 General 0 Jun, 2024 Buy
22 IS 17428 (Part 1) : 2020
Reviewed In : 2023

Data Privacy Assurance Part 1 Engineering and Management Requirements 0 Dec, 2023 Download
23 IS 17428 (Part 2) : 2020
Reviewed In : 2023

Data Privacy Assurance Part 2 Engineering and Management Guidelines 0 Dec, 2023 Download
24 IS 17737 (Part 1) : 2021
ISO 14243-3:2014

ISO 14243-3:2014
Mobile Device Security Part 1 Overview 0 ---- Buy
25 IS 17737 (Part 2) : 2021
ISO 16827 : 2012

ISO 16827 : 2012
Mobile Device Security Part 2 Security Requirements 0 ---- Buy
26 IS 17737 (Part 3) : 2021

IEC 60834-1: 1999
Mobile Device Security Part 3 Security levels 0 ---- Buy
27 IS 17737 (Part 4) : 2021
ISO/TS 11059 : 2009

ISO/TS 11059 : 2009
Mobile Device Security Part 4 Assessment and Evaluation 0 ---- Buy
28 IS/ISO/IEC 18014-1 : 2008
Reviewed In : 2024
ISO/IEC 18014-1 : 2008
Information Technology- Security Techniques- Time Stamping Services Part 1 Framework 0 Feb, 2024 Buy
29 IS/ISO/IEC 18014-2 : 2021
ISO 18692-5:2024

ISO 18692-5:2024
(First Revision)
Information security Time- stamping services Part 2: Mechanisms producing independent tokens 0 ---- Buy
30 IS/ISO/IEC 18014-3 : 2009
Reviewed In : 2024
ISO/IEC 18014-3:2009
Information technology - Security techniques - Time - Stamping services: Part 3 mechanisms producing linked tokens 0 Feb, 2024 Buy
31 IS/ISO/IEC 18014-4 : 2015
Reviewed In : 2022
ISO/IEC 18014-4 : 2015
Information Technology - Security Techniques - Time-Stamping Services Part 4 Traceability of Time Sources 0 May, 2022 Buy
32 IS/ISO/IEC 18031 : 2011
Reviewed In : 2024
ISO/IEC 18031:2011
Information technology - Security techniques - Random bit generation 1 Jul, 2024 Buy
33 IS/ISO/IEC 18033-1 : 2021

ISO/TS 19837:2018
(First Revision)
Information security Encryption algorithms Part 1: General First Revision 0 ---- Buy
34 IS/ISO/IEC 18033-2 : 2006
Reviewed In : 2024
18033-2:2006
Information Technology - Security Techniques - Encryption Algorithms Part 2 Asymmetric Ciphers 1 Jun, 2024 Buy
35 IS/ISO/IEC 18033-3 : 2010
Reviewed In : 2024
ISO/IEC 18033-3 : 2010
Information Technology-Security Techniques - Encryption Algorithms Part 3 Block Ciphers 1 Jun, 2024 Buy
36 IS/ISO/IEC 18033-4 : 2011
Reviewed In : 2022
ISO/IEC 18033-4:2011
Information technology - Security techniques - encryption algorithms: Part 4 stream ciphers 1 May, 2022 Buy
37 IS/ISO/IEC 18033-5 : 2015
Reviewed In : 2022
ISO/IEC 18033-5:2015
Information technology - Security techniques - Encryption algorithms: Part 5 identity - Based ciphers 1 May, 2022 Buy
38 IS/ISO/IEC 19790 : 2012

ISO/TS 30423: 2021
INFORMATION TECHNOLOGY SECURITY TECHNIQUES SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES 0 ---- Buy
39 IS/ISO/IEC 19792 : 2009

IEC 60068-1:2013
Information Technology Security techniques Security evaluation of biometrics 0 ---- Buy
40 IS/ISO/IEC 19896-1 : 2018
Reviewed In : 2023
ISO/IEC 19896-1:2018
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 1 Introduction, Concepts and General Requirements 0 Jan, 2023 Buy
41 IS/ISO/IEC 19896-2 : 2018
Reviewed In : 2023
ISO/IEC 19896-2:2018
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 2 Knowledge, Skills and Effectiveness Requirements for ISO / IEC 19790 Testers 0 Jan, 2023 Buy
42 IS/ISO/IEC 19896-3 : 2018
Reviewed In : 2023
ISO/IEC 19896-3:2018
IT Security Techniques - Competence Requirements for Information Security Testers and Evaluators Part 3 Knowledge, Skills and Effectiveness Requirements for ISO/IEC 15408 Evaluators 0 Jan, 2023 Buy
43 IS/ISO/IEC/TS 20540 : 2018
Reviewed In : 2023
ISO/IEC TS 20540:2018
Information Technology - Security Techniques - Testing Cryptographic Modules in their Operational Environment 0 Jan, 2023 Buy
44 IS/ISO/IEC 20543 : 2019


Information technology Security techniques Test and analysis methods for random bit generators within ISOIEC 19790 and ISOIEC 15408 0 ---- Buy
45 IS/ISO/IEC 20547-4 : 2020


INFORMATION TECHNOLOGY BIG DATA REFERENCE ARCHITECTURE PART 4: SECURITY AND PRIVACY 0 ---- Buy
46 IS/ISO/IEC 24745 : 2022
ISO 23527:2022

ISO 23527:2022
Information security cybersecurity and privacy protection Biometric information protection 0 ---- Buy
47 IS/ISO/IEC 24759 : 2017


Information technology Security techniques Test requirements for cryptographic modules 0 ---- Buy
48 IS/ISO/IEC 24761 : 2019

ISO 37000
Information technology Security techniques Authentication context for biometrics 0 ---- Buy
49 IS/ISO/IEC 27000 : 2018
Reviewed In : 2022
ISO/IEC 27000:2018
(First Revision)
Information technology - Security techniques - information: Security management systems - Overview and vocabulary (First Revision) 0 May, 2022 Buy
50 IS/ISO/IEC 27001 : 2013
Reviewed In : 2022
ISO/IEC 27001:2013
(First Revision)
Information Technologies - Security Techniques - information Security Managemet Systems - Requirements (First Revision) 1 Dec, 2022 Buy
51 IS/ISO/IEC 27001 : 2022

ISO/IEC 27001:2022
(Second Revision)
Information Security, Cybersecurity and Privacy Protection - Information Security Management Systems - Requirements (Second Revision) 1 ---- Buy
52 IS/ISO/IEC 27002 : 2022


(Second Revision)
Information security cybersecurity and privacy protection Information security controls 0 ---- Buy
53 IS/ISO/IEC 27003 : 2017
Reviewed In : 2021
ISO/IEC 27003:2017
(First Revision)
Information technology - Security techniques - Information: Security management systems - Guidance (First Revision) 0 Sep, 2021 Buy
54 IS/ISO/IEC 27004 : 2016
Reviewed In : 2022
ISO/IEC 27004:2016
(First Revision)
Information technology - Security techniques - Information: Security management - Monitoring, measurement, analysis and evaluation (First Revision) 0 May, 2022 Buy
55 IS/ISO/IEC 27005 : 2022


(Third Revision)
Information security cybersecurity and privacy protection Guidance on managing information security risks 0 ---- Buy
56 IS/ISO/IEC 27006 : 2015
Reviewed In : 2024
ISO/IEC 27006 : 2015
(First Revision)
Information technology - Security techniques - Requirements for bodies providing audit and Certification of Information Security Management systems (First Revision) 1 Jun, 2024 Buy
57 IS/ISO/IEC 27007 : 2020
ISO 28564-3 : 2019

ISO 28564-3 : 2019
(First Revision)
Information security cybersecurity and privacy protection Guidelines for information security management systems auditing 0 ---- Buy
58 IS/ISO/IEC/TS 27008 : 2019
Reviewed In : 2023
ISO/IEC TS 27008:2019
(First Revision)
Information Technology — Security Techniques — Guidelines for the Assessment of Information Security Controls ( First Revision ) 0 Sep, 2023 Buy
59 IS/ISO/IEC 27010 : 2015
Reviewed In : 2024
ISO/IEC 27010:2015
Information Technology - Security Techniques - Information Security Management for Inter-Sector and Inter-Organizational Communications 0 May, 2024 Buy
60 IS/ISO/IEC 27011 : 2024


(Second Revision)
Information Security, Cybersecurity and Privacy Protection — Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations (Second Revision) 0 ---- Buy
61 IS/ISO/IEC 27011 : 2016
Reviewed In : 2023
ISO/IEC 27011:2024
(First Revision)
Information Technology — Security Techniques — Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Telecommunications Organizations ( First Revision ) 0 Feb, 2023 Buy
62 IS/ISO/IEC 27017 : 2015
Reviewed In : 2024
ISO/IEC 27017 : 2015
Information Technology - Security Techniques - Code of Practice for Information Security Controls Based on ISO/IEC 27002 for Cloud Services 0 Jun, 2024 Buy
63 IS/ISO/IEC 27018 : 2019
Reviewed In : 2023
ISO/IEC 27018:2019
(First Revision)
Information Technology — Security Techniques — Code of Practice for Protection of Personally Identifiable Information ( PII ) in Public Clouds Acting as PII Processors ( First Revision ) 0 Sep, 2023 Buy
64 IS/ISO/IEC 27019 : 2017
Reviewed In : 2022
ISO/IEC 27019:2017
Information Technology - Security Techniques - Information Security Controls for the Energy Utility Industry 0 Dec, 2022 Buy
65 IS/ISO/IEC 27032 : 2023


(First Revision)
Cyber Security — Internet Security — Guidelines (First Revision) 0 ---- Buy
66 IS/ISO/IEC 27033-1 : 2015
Reviewed In : 2024
ISO/IEC 27033-1:2015
(First Revision)
Information Technology - Security Techniques - Network Security Part 1 Overview and Concepts (First Revision) 0 Jun, 2024 Buy
67 IS/ISO/IEC 27033-2 : 2012
Reviewed In : 2024
ISO/IEC 27033-2:2012
Information technology - Security techniques: Part 2 guidelines for the design and implementation of network: Security 0 Jul, 2024 Buy
68 IS/ISO/IEC 27033-3 : 2010
Reviewed In : 2022
ISO/IEC 27033-3 :2010
Information technology - Security techniques - Network: Security: Part 3 reference networking scenarios - Threats, design techniques and control issues 0 Jan, 2022 Buy
69 IS/ISO/IEC 27033-4 : 2014
Reviewed In : 2022
ISO/IEC 27033-4:2014
Information technology - Security techniques - Network: Security: Part 4 Securing communications between networks using: Security gateways 0 Nov, 2022 Buy
70 IS/ISO/IEC 27033-5 : 2013
Reviewed In : 2024
ISO/IEC 27033-5:2013
Information technology - Security techniques - Network Security: Part 5 Securing communications across networks using virtual pr4ate networks (VPNs) 0 Jun, 2024 Buy
71 IS/ISO/IEC 27033-6 : 2016
Reviewed In : 2022
ISO/IEC 27033-6:2016
Information technology - Security techniques - Network Security: Part 6 Securing wireless IP network access 0 May, 2022 Buy
72 IS/ISO/IEC 27034-1 : 2011
Reviewed In : 2024
ISO/IEC 27034-1 : 2011
Information technology - Security techniques - Application Security: Part 1 overview and concepts 1 Jul, 2024 Buy
73 IS/ISO/IEC 27034-2 : 2015
Reviewed In : 2022
ISO/IEC 27034-2:2015
Information technology - Security techniques - Application Security: Part 2 organization normat4e framework 0 May, 2022 Buy
74 IS/ISO/IEC 27034-3 : 2018
Reviewed In : 2023
ISO/IEC 27034-3:2018
Information Technology - Application Security Part 3 Application Security Management Process 0 Jan, 2023 Buy
75 IS/ISO/IEC/TS 27034-5-1 : 2018
Reviewed In : 2023
ISO/IEC TS 27034-5-1:2018
Information Technology - Application Security Part 5-1 Protocols and Application Security Controls Data Structure, XML Schemas 0 Jan, 2023 Buy
76 IS/ISO/IEC 27034-5 : 2017
Reviewed In : 2022
ISO/IEC 27034-5:2017
Information technology - Security techniques - Application Security: Part 5 protocols and application Security controls data structure 0 May, 2022 Buy
77 IS/ISO/IEC 27034-6 : 2016
Reviewed In : 2022
ISO/IEC 27034-6:2016
Information technology - Security techniques - Application Security: Part 6 case studies 0 May, 2022 Buy
78 IS/ISO/IEC 27034-7 : 2018
Reviewed In : 2023
ISO/IEC 27034-7:2018
Information Technology - Application Security Part 7 Assurance Prediction Framework 0 Jan, 2023 Buy
79 IS/ISO/IEC 27035-1 : 2023


(First Revision)
Information Technology Information Security Incident Management Part 1: Principles and Process Second Revision 0 ---- Buy
80 IS/ISO/IEC 27035-2 : 2023


(First Revision)
Information Technology Information security incident management Part 2: Guidelines to plan and prepare for incident response Second Revision 0 ---- Buy
81 IS/ISO/IEC 27035-3 : 2020
ISO 22468 : 2020

ISO 22468 : 2020
INFORMATION TECHNOLOGY INFORMATION SECURITY INCIDENT MANAGEMENT PART 3: GUIDELINES FOR ICT INCIDENT RESPONSE OPERATIONS 0 ---- Buy
82 IS/ISO/IEC 27036-1 : 2021


(First Revision)
Cybersecurity Supplier relationships Part 1: Overview and concepts First Revision 0 ---- Buy
83 IS/ISO/IEC 27036-2 : 2022


Cybersecurity Supplier Relationships Part 2: Requirements 0 ---- Buy
84 IS/ISO/IEC 27036-3 : 2023


(First Revision)
Cybersecurity - Supplier Relationships Part 3: Guidelines for Hardware Software and Services Supply Chain Security ( First Revision) 0 ---- Buy
85 IS/ISO/IEC 27036-3 : 2013
Reviewed In : 2023
ISO/IEC 27036-3:2023
Information technology - Security techniques - Information Security for supplier relationships: Part 3 guidelines for information and communication technology supply chain Security 0 Oct, 2023 Buy
86 IS/ISO/IEC 27036-4 : 2016
Reviewed In : 2022
ISO/IEC 27036-4:2016
Information Technology - Security Techniques - Information Security for Supplier Relationships Part 4 Guidelines for Security of Cloud Services 0 Dec, 2022 Buy
87 IS/ISO/IEC 27037 : 2012
Reviewed In : 2024
ISO/IEC 27037 : 2012
Information Technology - Security Techniques - Guidelines for Identification,Collection,Acquisition and Preservation of Digital Evidence 0 Jun, 2024 Buy
88 IS/ISO/IEC 27040 : 2024


(First Revision)
Information Technology — Security Techniques — Storage Security (First Revision) 0 ---- Buy
89 IS/ISO/IEC 27040 : 2015
Reviewed In : 2024
ISO/IEC 27040:2024
Information Technology - Security Techniques - Storage Security 0 Jun, 2024 Buy
90 IS/ISO/IEC 27050-1 : 2019

ISO/IEC TR 12785-3: 2012
(First Revision)
Information technology Electronic discovery Part 1: Overview and concepts 0 ---- Buy
91 IS/ISO/IEC 27050-2 : 2018


Information Technology � Electronic Discovery Part 2: Guidance for Governance and Management of Electronic Discovery 0 ---- Buy
92 IS/ISO/IEC 27050-3 : 2020


(First Revision)
Information technology Electronic discovery Part 3: Code of practice for electronic discovery 0 ---- Buy
93 IS/ISO/IEC 27050-4 : 2021
ISO 8968-3:2004

ISO 8968-3:2004
Information technology -Electronic discovery Part 4: Technical readiness 0 ---- Buy
94 IS/ISO/IEC 27071 : 2023


Cybersecurity - Security Recommendations for Establishing Trusted Connections Between Devices and Services 0 ---- Buy
95 IS/ISO/IEC 27099 : 2022


Information technology Public key infrastructure Practices and policy framework 0 ---- Buy
96 IS/ISO/IEC/TS 27100 : 2020
ISO 14891 : 2002

ISO 14891 : 2002
INFORMATION TECHNOLOGY CYBERSECURITY OVERVIEW AND CONCEPTS 0 ---- Buy
97 IS/ISO/IEC/TR 27103 : 2018
Reviewed In : 2023
ISO/IEC TR 27103:2018
Information Technology - Security Techniques - Cybersecurity and ISO and IEC Standards 0 Jan, 2023 Buy
98 IS/ISO/IEC 27400 : 2022


Cybersecurity IoT Security and Privacy Guidelines 0 ---- Buy
99 IS/ISO/IEC 27402 : 2023


Cybersecurity IoT Security and Privacy Device Baseline Requirements 0 ---- Buy
100 IS/ISO/IEC/TR 27550 : 2019


Information technology Security techniques Privacy engineering for system life cycle processes 0 ---- Buy
101 IS/ISO/IEC 29100 : 2024


(First Revision)
Information Technology — Security Techniques — Privacy Framework (First Revision) 0 ---- Buy
102 IS/ISO/IEC 29100 : 2011
Reviewed In : 2024
ISO/IEC 29100:2024
Information Technology - Security Techniques - Privacy Framework 1 Jun, 2024 Buy
103 IS/ISO/IEC 29101 : 2018
Reviewed In : 2023
ISO/IEC 29101:2018
Information Technology — Security Techniques — Privacy Architecture Framework 0 Sep, 2023 Buy
104 IS/ISO/IEC 29184 : 2020


Information technology Online privacy notices and consent 0 ---- Buy
105 IS/ISO/IEC 29192-1 : 2012
Reviewed In : 2024
ISO/IEC 29192-1 : 2012
Information Technology - Security Techniques - Lightweight Crytography Part 1 General 0 Jun, 2024 Buy
106 IS/ISO/IEC 29192-2 : 2019
ISO 10797 : 2012

ISO 10797 : 2012
(First Revision)
Information security Lightweight cryptography Part 2: Block ciphers First Revision 0 ---- Buy
107 IS/ISO/IEC 29192-3 : 2012
Reviewed In : 2024
ISO/IEC 29192-3 : 2012
Information Technology - Security Techniques - Lightweight Cryptography Part 3 Stream Ciphers 0 May, 2024 Buy
108 IS/ISO/IEC 29192-4 : 2013
Reviewed In : 2024
ISO/IEC 29192-4 : 2013
Information Technology - Security Techniques - Lightweight Cryptography Part 4 Mechanisms Using Asymmetric Techniques 1 Jun, 2024 Buy
109 IS/ISO/IEC 29192-5 : 2016
Reviewed In : 2022
ISO/IEC 29192-5:2016
Information Technology - Security Techniques - Lightweight Cryptography Part 5 Hash-Functions 0 Dec, 2022 Buy
110 IS/ISO/IEC 29192-6 : 2019


Information technology Lightweight cryptography Part 6: Message authentication codes MACs 0 ---- Download
111 IS/ISO/IEC 29192-7 : 2019

8601-2
Information security Lightweight cryptography Part 7: Broadcast authentication protocols 0 ---- Buy
112 IS/ISO/IEC 29192-8 : 2022


Information Security Lightweight Cryptography Part 8: Authenticated Encryption 0 ---- Buy
113 IS/ISO/IEC 9796-2 : 2010
Reviewed In : 2024
ISO/IEC 9796-2:2010
(First Revision)
Information technology - Security techniques - Digital signature schemes g4ing message recovery: Part 2 integer factorization based mechanisms (First Revision) 0 Jun, 2024 Buy
114 IS/ISO/IEC 9796-3 : 2006
Reviewed In : 2022
ISO/IEC 9796-3:2006
Information technology - Security techniques - Digital signature schemes giving message recovery: Part 3 discrete logarithm based mechanisms 0 Apr, 2022 Buy