1.5.6.1 DESCRIPCIÓN DE DOCUMENTOS NORMATIVOS
DEL ISO JTC1/SC27

ISO 8372 Information Processing - Modes of Operation for a 64-bit Block Cipher Algorithm.
ISO/IEC 9796 Information Technology - Security Techniques - Digital Signature Scheme Giving message Recovery.
ISO/IEC 9797 Information Technology - Security Techniques - Data Integrity Mechanism Using a Cryptographic Check Function Employing a Block Cipher Algorithm.
ISO/IEC 9798-1 Information Technology - Security Techniques - Entity Authentication - Part 1: General Model.
ISO/IEC 9798-2 Information Technology - Security Techniques - Entity Authentication - Part 2: Mechanisms Using Symmetric Encipherment Algorithms.
ISO/IEC 9798-3 Information Technology - Security Techniques- Entity Authentication Mechanisms - Part 3: Entity Authentication Using a Public Key Algorithm.
ISO/IEC 9798-4 Information Technology - Security Techniques - Entity Authentication - Part 4: Mechanisms Using a Cryptographic Check Function.
ISO/IEC CD 9798-5 Information Technology - Security Techniques - Entity Authentication - Part 5: Mechanisms Using Zero Knowledge Techniques.
ISO/IEC 9979 Data Cryptographic Techniques - Procedures for the Registration of Cryptographic Algorithms.
ISO/IEC 10116 Information Technology - Modes of Operation for an n-bit Block Cipher Algorithm.
ISO/IEC 10118-1 Information Technology - Security Techniques - Hash - Functions - Part 1: General.
ISO/IEC 10118-2 Information Technology - Security Techniques - Hash - Functions - Part 2: Hash - Functions Using an n-bit Block Cipher Algorithm.
ISO/IEC 10118-3 Information Technology - Security Techniques - Hash -Functions - Part 3: Dedicated Hash-Functions.
ISO/IEC 10118-4 Information Technology - Security Techniques - Hash-Functions - Part 4: Hash-Functions Using Modular Arithmetic.

Retroceder

VOLVER