1.5.6.1 DESCRIPCIÓN DE DOCUMENTOS
NORMATIVOS
DEL ISO JTC1/SC27
| ISO 8372 | Information Processing - Modes of Operation for a 64-bit Block Cipher Algorithm. |
| ISO/IEC 9796 | Information Technology - Security Techniques - Digital Signature Scheme Giving message Recovery. |
| ISO/IEC 9797 | Information Technology - Security Techniques - Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm. |
| ISO/IEC 9798-1 | Information Technology - Security Techniques - Entity Authentication - Part 1: General Model. |
| ISO/IEC 9798-2 | Information Technology - Security Techniques - Entity Authentication - Part 2: Mechanisms Using Symmetric Encipherment Algorithms. |
| ISO/IEC 9798-3 | Information Technology - Security Techniques- Entity Authentication Mechanisms - Part 3: Entity Authentication Using a Public Key Algorithm. |
| ISO/IEC 9798-4 | Information Technology - Security Techniques - Entity Authentication - Part 4: Mechanisms Using a Cryptographic Check Function. |
| ISO/IEC CD 9798-5 | Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero Knowledge Techniques. |
| ISO/IEC 9979 | Data Cryptographic Techniques - Procedures for the Registration of Cryptographic Algorithms. |
| ISO/IEC 10116 | Information Technology - Modes of Operation for an n-bit Block Cipher Algorithm. |
| ISO/IEC 10118-1 | Information Technology - Security Techniques - Hash - Functions - Part 1: General. |
| ISO/IEC 10118-2 | Information Technology - Security Techniques - Hash - Functions - Part 2: Hash - Functions Using an n-bit Block Cipher Algorithm. |
| ISO/IEC 10118-3 | Information Technology - Security Techniques - Hash -Functions - Part 3: Dedicated Hash-Functions. |
| ISO/IEC 10118-4 | Information Technology - Security Techniques - Hash-Functions - Part 4: Hash-Functions Using Modular Arithmetic. |