ISO/IEC 10118-3:2004
Withdrawn
A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.
View Superseded by
Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
Hardcopy , PDF 1 User , PDF 3 Users , PDF 5 Users , PDF 9 Users
19-02-2019
24-02-2004
ISO/IEC 10118-3:2004 specifies the following seven dedicated hash-functions, i.e. specially-designed hash-functions:
- the first hash-function (RIPEMD-160) in Clause 7 provides hash-codes of lengths up to 160 bits;
- the second hash-function (RIPEMD-128) in Clause 8 provides hash-codes of lengths up to 128 bits;
- the third hash-function (SHA-1) in Clause 9 provides hash-codes of lengths up to 160 bits;
- the fourth hash-function (SHA-256) in Clause 10 provides hash-codes of lengths up to 256 bits;
- the fifth hash-function (SHA-512) in Clause 11 provides hash-codes of lengths up to 512 bits;
- the sixth hash-function (SHA-384) in Clause 12 provides hash-codes of a fixed length, 384 bits; and
- the seventh hash-function (WHIRLPOOL) in Clause 13 provides hash-codes of lengths up to 512 bits.
For each of these dedicated hash-functions, ISO/IEC 10118-3:2004 specifies a round-function that consists of a sequence of sub-functions, a padding method, initializing values, parameters, constants, and an object identifier as normative information, and also specifies several computation examples as informative information.
DocumentType |
Standard
|
Pages |
94
|
PublisherName |
International Organization for Standardization
|
Status |
Withdrawn
|
SupersededBy | |
Supersedes |
Standards | Relationship |
BS ISO/IEC 10118-3 : 2004 | Identical |
CSA ISO/IEC 10118-3A : 2007(R2014) | Identical |
NEN ISO/IEC 10118-3 : 2004 C1 2011 | Identical |
AS ISO/IEC 10118.3-2006 | Identical |
CSA ISO/IEC 10118-3 : 2004 : INC : COR 1 : 2013 : R200900 | Identical |
AS ISO/IEC 10118.3 SUPP 1-2006 | Identical |
CSA ISO/IEC 10118-3:2004(R2019) | Identical |
CSA ISO/IEC 10118-3 : 2004 | Identical |
INCITS/ISO/IEC 10118-3 : 2003 | Identical |
CSA ISO/IEC 10118-3 : 2004 : INC : AMD 1 : 2007 : R2014 | Identical |
BS ISO/IEC 10118-3:2004+A1:2006 | Identical |
07/30154069 DC : 0 | BS ISO/IEC 24727-3 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARD PROGRAMMING INTERFACES - PART 3: APPLICATION INTERFACE |
CSA ISO/IEC 18033-2 :2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
I.S. EN 62940:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - INTEGRATED COMMUNICATION SYSTEM (ICS) - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS |
TR 119 001 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); THE FRAMEWORK FOR STANDARDIZATION OF SIGNATURES; DEFINITIONS AND ABBREVIATIONS |
I.S. EN ISO 12855:2015 | ELECTRONIC FEE COLLECTION - INFORMATION EXCHANGE BETWEEN SERVICE PROVISION AND TOLL CHARGING (ISO 12855:2015) |
IEEE 1076-2008 REDLINE | IEEE Standard VHDL Language Reference Manual |
08/30169511 DC : DRAFT DEC 2008 | BS ISO/IEC 13888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CSA ISO/IEC 9798-5 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
PD CEN/TS 15480-2:2012 | Identification card systems. European Citizen Card Logical data structures and security services |
INCITS/ISO/IEC 9797-2 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
CSA ISO/IEC TR 14516 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
BS ISO 21188:2006 | Public key infrastructure for financial services. Practices and policy framework |
INCITS/ISO/IEC 15946-3 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES - PART 3: KEY ESTABLISHMENT |
CAN/CSA-ISO/IEC TR 14516-04 (R2017) | Information Technology - Security Techniques - Guidelines for the use and Management of Trusted Third Party Services (Adopted ISO/IEC TR 14516:2002, first edition, 2002-06-15) |
BS ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT). Application level syntax rules (Syntax version number: 4, Syntax release number: 2) Syntax service directories |
CSA ISO/IEC TR 14516 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - GUIDELINES FOR THE USE AND MANAGEMENT OF TRUSTED THIRD PARTY SERVICES |
INCITS/ISO/IEC 15945 : 2002 : R2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 15945 : 2002 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 11770-5 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
DIN ISO 9735-10:2015-05 | ELECTRONIC DATA INTERCHANGE FOR ADMINISTRATION, COMMERCE AND TRANSPORT (EDIFACT) - APPLICATION LEVEL SYNTAX RULES (SYNTAX VERSION NUMBER: 4, SYNTAX RELEASE NUMBER: 2) - PART 10: SYNTAX SERVICE DIRECTORIES (ISO 9735-10:2014) |
CAN/CSA-ISO/IEC 18033-2:06 (R2016) | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
EN ISO 24534-4:2010 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
IEEE 1363.2 : 2008 | SPECIFICATION FOR PASSWORD-BASED PUBLIC-KEY CRYPTOGRAPHIC TECHNIQUES |
I.S. EN 62734:2015 | INDUSTRIAL NETWORKS - WIRELESS COMMUNICATION NETWORK AND COMMUNICATION PROFILES - ISA 100.11A |
S.R. CEN/TS 15480-2:2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
UNI CEN/TS 15480-2 : 2012 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 2: LOGICAL DATA STRUCTURES AND SECURITY SERVICES |
ISO/IEC 18033-2:2006 | Information technology — Security techniques — Encryption algorithms — Part 2: Asymmetric ciphers |
BS ISO 16609:2012 | Financial services. Requirements for message authentication using symmetric techniques |
BS IEC 61691-1-1:2011 | Behavioural languages VHDL Language reference manual |
UNI CEI ISO/IEC 29500-1 : 2013 | INFORMATION TECHNOLOGY - DOCUMENT DESCRIPTION AND PROCESSING LANGUAGES - OFFICE OPEN XML FILE FORMATS - PART 1: FUNDAMENTALS AND MARKUP LANGUAGE REFERENCE |
ISO/IEC 25185-1:2016 | Identification cards Integrated circuit card authentication protocols Part 1: Protocol for Lightweight Authentication of Identity |
IEC 61691-1-1:2011 | Behavioural languages - Part 1-1: VHDL Language Reference Manual |
ISO/IEC 15945:2002 | Information technology — Security techniques — Specification of TTP services to support the application of digital signatures |
CEN/TS 16702-2:2015 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder |
CEN/TS 15130:2006 | Postal services - DPM infrastructure - Messages supporting DPM applications |
CEN ISO/TS 19299:2015 | Electronic fee collection - Security framework (ISO/TS 19299:2015) |
IEC 62320-2:2016 RLV | Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results |
EN 61162-460:2015 | Maritime navigation and radiocommunication equipment and systems - Digital interfaces - Part 460: Multiple talkers and multiple listeners - Ethernet interconnection - Safety and security |
EN 62940:2017 | Maritime navigation and radiocommunication equipment and systems - Integrated communication system (ICS) - Operational and performance requirements, methods of testing and required test results |
EN 62734:2015 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEN/TS 15480-2:2012 | Identification card systems - European Citizen Card - Part 2: Logical data structures and security services |
17/30337383 DC : 0 | BS ISO/IEC 14888-3 AMD1 - INFORMATION SECURITY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
ISO/IEC 11770-5:2011 | Information technology Security techniques Key management Part 5: Group key management |
08/30169505 DC : DRAFT JULY 2008 | BS ISO/IEC 13888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 1: GENERAL |
09/30202174 DC : 0 | BS EN 50159 - RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
10/30192164 DC : DRAFT JUNE 2010 | BS ISO/IEC 29150 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SIGNCRYPTION |
S.R. CEN/TS 16702-2:2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER |
DD CEN/TS 15130:2006 | Postal services. DPM infrastructure. Messages supporting DPM applications |
10/30228327 DC : 0 | BS ISO/IEC 18031 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
UNI CEI ISO/IEC 29500-4 : 2013 | INFORMATION TECHNOLOGY - DOCUMENT DESCRIPTION AND PROCESSING LANGUAGES - OFFICE OPEN XML FILE FORMATS - PART 4: TRANSITIONAL MIGRATION FEATURES |
12/30259506 DC : DRAFT JAN 2012 | BS EN 62734 - INDUSTRIAL COMMUNICATION NETWORKS - FIELDBUS SPECIFICATIONS - WIRELESS SYSTEMS FOR INDUSTRIAL AUTOMATION: PROCESS CONTROL AND RELATED APPLICATIONS (BASED ON ISA 100.11A) |
16/30288045 DC : 0 | BS ISO/IEC 20009-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ANONYMOUS ENTITY AUTHENTICATION - PART 4: MECHANISMS BASED ON WEAK SECRETS |
BS ISO/IEC 19790:2012 | Information technology. Security techniques. Security requirements for cryptographic modules |
TS 133 220 : 13.0.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; GENERIC AUTHENTICATION ARCHITECTURE (GAA); GENERIC BOOTSTRAPPING ARCHITECTURE (GBA) (3GPP TS 33.220 VERSION 14.1.0 RELEASE 14) |
PD ISO/TR 14742:2010 | Financial services. Recommendations on cryptographic algorithms and their use |
S.R. CEN/TS 16439:2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
BS ISO/IEC 15945:2002 | Information technology. Security techniques. Specification of TTP services to support the application of digital signatures |
CSA ISO/IEC 13888-3 : 2010 : R2015 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CSA ISO/IEC 9797-2:2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) - PART 2: MECHANISMS USING A DEDICATED HASH-FUNCTION |
04/30105372 DC : DRAFT DEC 2004 | ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ECMA 410 : 3ED 2017 | NFC-SEC-03: NFC-SEC ENTITY AUTHENTICATION AND KEY AGREEMENT USING ASYMMETRIC CRYPTOGRAPHY |
DD CEN/TS 15480-2:2007 | Identification card systems. European Citizen Card Logical data structures and card services |
CAN/CSA-ISO/IEC 9797-2:13 (R2017) | Information technology - Security techniques - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function (Adopted ISO/IEC 9797-2:2011, second edition, 2011-05-01) |
CAN/CSA-ISO/IEC 15945-04 (R2017) | Information Technology - Security Techniques - Specification of TTP Services to Support the Application of Digital Signatures (Adopted ISO/IEC 15945:2002, first edition, 2002-02-01) |
INCITS/ISO/IEC 18033-2 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
BS ISO/IEC 18031 : 2011 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 18013-3:2017 | Information technology. Personal identification. ISO-compliant driving licence Access control, authentication and integrity validation |
ETR 237 : 20001 | SECURITY TECHNIQUES ADVISORY GROUP (STAG) - BASELINE SECURITY STANDARDS - FEATURES AND MECHANISMS |
ISO/IEC 9834-8:2014 | Information technology — Procedures for the operation of object identifier registration authorities — Part 8: Generation of universally unique identifiers (UUIDs) and their use in object identifiers |
BS EN ISO 24534-4:2010+A1:2019 | Automatic vehicle and equipment identification. Electronic registration identification (ERI) for vehicles Secure communications using asymmetrical techniques |
ISO/IEC 29500-1:2016 | Information technology — Document description and processing languages — Office Open XML File Formats — Part 1: Fundamentals and Markup Language Reference |
PREN 50159 : DRAFT 2009 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO 21188:2018 | Public key infrastructure for financial services — Practices and policy framework |
ISO/IEC 11889-1:2015 | Information technology Trusted platform module library Part 1: Architecture |
ISO/IEC 13888-3:2009 | Information technology Security techniques Non-repudiation Part 3: Mechanisms using asymmetric techniques |
ISO/IEC 11889-2:2015 | Information technology Trusted Platform Module Library Part 2: Structures |
IEC 62530:2011 | SystemVerilog - Unified Hardware Design, Specification, and Verification Language |
NEMA PS3.3 : 2017A | DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 3: INFORMATION OBJECT DEFINITIONS |
NEMA PS 3.15 : 2017A | DIGITAL IMAGING AND COMMUNICATIONS IN MEDICINE (DICOM) - PART 15: SECURITY AND SYSTEM MANAGEMENT PROFILES |
IEEE 1800-2012 | IEEE Standard for SystemVerilog--Unified Hardware Design, Specification, and Verification Language |
04/30040717 DC : DRAFT JUL 2004 | ISO/IEC 18033-2 - INFORMATION TECHNOLOGY - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
08/30135059 DC : 0 | ISO/IEC 9797-2 (REV) - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - MESSAGE AUTHENTICATION CODES (MACS) |
17/30281253 DC : 0 | BS ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
16/30346333 DC : 0 | BS EN 61162-460 - MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS -DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY |
BS ISO/IEC 17960:2015 | Information technology. Programming languages, their environments and system software interfaces. Code signing for source code |
PD CEN/TS 16702-2:2015 | Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder |
BS ISO/IEC 13888-3:1997 | Information technology. Security techniques. Non-repudiation Mechanisms using asymmetric techniques |
15/30286868 DC : 0 | BS ISO/IEC 14888-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
BS EN 50159:2010 | Railway applications. Communication, signalling and processing systems. Safety-related communication in transmission systems |
07/30163724 DC : 0 | BS ISO/IEC 24727-4 - IDENTIFICATION CARDS - INTEGRATED CIRCUIT CARDS PROGRAMMING INTERFACE - PART 4: API ADMINISTRATION |
17/30345248 DC : 0 | BS ISO/IEC 9798-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 3: MECHANISMS USING DIGITAL SIGNATURE TECHNIQUES |
12/30228421 DC : 0 | BS ISO/IEC 29192-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
08/30180103 DC : DRAFT MAR 2008 | BS EN 50136-1 - ALARM SYSTEMS - ALARM TRANSMISSION SYSTEMS - PART 1: GENERAL REQUIREMENTS FOR ALARM TRANSMISSION SYSTEMS |
BS ISO/IEC 20009-4:2017 | Information technology. Security techniques. Anonymous entity authentication Mechanisms based on weak secrets |
TR 102 272 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ASN.1 FORMAT FOR SIGNATURE POLICIES |
PD CEN/TS 15480-3:2014 | Identification card systems. European Citizen Card European Citizen Card Interoperability using an application interface |
14/30302807 DC : 0 | BS ISO/IEC 11889-4 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: SUPPORTING ROUTINES |
04/30040736 DC : DRAFT DEC 2004 | ISO/IEC 18031 - INFORMATION TECHNOLOGY - RANDOM NUMBER GENERATION |
INCITS/ISO/IEC 18031 : 2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
BS ISO/IEC 14888-3 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
BS ISO/IEC 25185-1:2016 | Identification cards. Integrated circuit card authentication protocols Protocol for Lightweight Authentication of Identity |
07/30161079 DC : 0 | BS EN 14890-1 - APPLICATION INTERFACE FOR SMART CARDS USED AS SECURE SIGNATURE CREATION DEVICES - PART 1: BASIC SERVICES |
BS ISO/IEC 29150:2011 | Information technology. Security techniques. Signcryption |
BS EN ISO 12855:2015 | Electronic fee collection. Information exchange between service provision and toll charging |
ISO/IEC 29167-17:2015 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications |
ISO/IEC 18013-3:2017 | Information technology — Personal identification — ISO-compliant driving licence — Part 3: Access control, authentication and integrity validation |
CAN/CSA-ISO/IEC 18031:13 (R2017) | Information technology - Security techniques - Random bit generation (Adopted ISO/IEC 18031:2011, second edition, 2011-11-15) |
BS EN 62734:2015 | Industrial networks. Wireless communication network and communication profiles. ISA 100.11a |
CSA ISO/IEC 18031 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - RANDOM BIT GENERATION |
SR 002 176 : 1.1.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); ALGORITHMS AND PARAMETERS FOR SECURE ELECTRONIC SIGNATURES |
CSA ISO/IEC 14888-3 : 2018 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 3: DISCRETE LOGARITHM BASED MECHANISMS |
ISO 15764:2004 | Road vehicles Extended data link security |
I.S. EN 61162-460:2015 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - DIGITAL INTERFACES - PART 460: MULTIPLE TALKERS AND MULTIPLE LISTENERS - ETHERNET INTERCONNECTION - SAFETY AND SECURITY |
BS ISO/IEC 29192-4 : 2013 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
I.S. CEN TS 15130:2006 | POSTAL SERVICES - DPM INFRASTRUCTURE - MESSAGES SUPPORTING DPM APPLICATIONS |
S.R. CWA 16926-65:2015 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 65: PIN KEYPAD DEVICE CLASS INTERFACE - MIGRATION FROM VERSION 3.20 (CWA 16374) TO VERSION 3.30 (THIS CWA) - PROGRAMMER'S REFERENCE |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
S.R. CEN/TS 15480-3:2014 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
S.R. CEN ISO/TS 19299:2015 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
ISO/IEC 29500-4:2016 | Information technology — Document description and processing languages — Office Open XML File Formats — Part 4: Transitional Migration Features |
CAN/CSA-ISO/IEC 17960:16 | Information technology Programming languages, their environments and system software interfaces Code signing for source code (Adopted ISO/IEC 17960:2015, first edition, 2015-09-01) |
CAN/CSA-ISO/IEC 11889-4:16 | Information technology Trusted Platform Module Library Part 4: Supporting Routines (Adopted ISO/IEC 11889-4:2015, second edition, 2015-12-15) |
BS ISO/IEC 11770-4:2017 | Information technology. Security techniques. Key management Mechanisms based on weak secrets |
TS 123 057 : 13.0.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); MOBILE EXECUTION ENVIRONMENT (MEXE); FUNCTIONAL DESCRIPTION; STAGE 2 (3GPP TS 23.057 VERSION 14.0.0 RELEASE 14) |
ISO/IEC 17960:2015 | Information technology Programming languages, their environments and system software interfaces Code signing for source code |
ISO 24534-4:2010 | Automatic vehicle and equipment identification — Electronic registration identification (ERI) for vehicles — Part 4: Secure communications using asymmetrical techniques |
ISO 15782-1:2009 | Certificate management for financial services Part 1: Public key certificates |
ISO/IEC 9798-5:2009 | Information technology — Security techniques — Entity authentication — Part 5: Mechanisms using zero-knowledge techniques |
ISO/TR 14742:2010 | Financial services Recommendations on cryptographic algorithms and their use |
ISO/IEC 9797-2:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function |
I.S. EN 62320-2:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS |
ISO/TS 19299:2015 | Electronic fee collection Security framework |
UNE-EN 50159:2011 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
IEC 62734:2014 | Industrial networks - Wireless communication network and communication profiles - ISA 100.11a |
CEI EN 50159 : 2012 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ONORM ONR CEN/TS 16702-2 : 2015 | ELECTRONIC FEE COLLECTION - SECURE MONITORING FOR AUTONOMOUS TOLL SYSTEMS - PART 2: TRUSTED RECORDER (CEN/TS 16702-2:2015) |
TS 133 224 : 13.0.0 | UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; GENERIC AUTHENTICATION ARCHITECTURE (GAA); GENERIC BOOTSTRAPPING ARCHITECTURE (GBA) PUSH LAYER (3GPP TS 33.224 VERSION 14.0.0 RELEASE 14) |
TS 133 223 : 13.1.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+) (GSM); UNIVERSAL MOBILE TELECOMMUNICATIONS SYSTEM (UMTS); LTE; GENERIC AUTHENTICATION ARCHITECTURE (GAA); GENERIC BOOTSTRAPPING ARCHITECTURE (GBA) PUSH FUNCTION (3GPP TS 33.223 VERSION 14.0.0 RELEASE 14) |
EN 62320-2:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016) |
UNI CEI ISO/IEC 18013-3 : 2011 | INFORMATION TECHNOLOGY - PERSONAL IDENTIFICATION - ISO-COMPLIANT DRIVING LICENCE - PART 3: ACCESS CONTROL, AUTHENTICATION AND INTEGRITY VALIDATION |
INCITS/ISO/IEC 11889-4 : 2009(R2014) | INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 4: COMMANDS |
DD ENV 13729:2000 | Health informatics. Secure user identification. Strong authentication microprocessor cards |
14/30302798 DC : 0 | BS ISO/IEC 11889-1 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 1: ARCHITECTURE |
BS ISO/IEC 11770-5:2011 | Information technology Security techniques. Key management Group key management |
BS ISO/IEC 11889-4:2009 | Information technology. Trusted platform module Commands |
05/30092187 DC : DRAFT APR 2005 | ISO 21188 - PUBLIC KEY INFRASTRUCTURE FOR FINANCIAL SERVICES - PRACTICES AND POLICY FRAMEWORK |
ECMA 376 : 5ED 2015 | OFFICE OPEN XML FILE FORMATS - PART 1: FUNDAMENTALS AND MARKUP LANGUAGE REFERENCE - PART 2: OPEN PACKAGING CONVENTIONS - PART 3: MARKUP COMPATIBILITY AND EXTENSIBILITY - PART 4: TRANSITIONAL MIGRATION FEATURES |
BS ISO 15782-1:2009 | Certificate management for financial services Public key certificates |
BS ISO/IEC TR 14516:2002 | Information technology. Security techniques. Guidelines for the use and management of trusted third party services |
ISO/IEC 29192-4:2013 | Information technology — Security techniques — Lightweight cryptography — Part 4: Mechanisms using asymmetric techniques |
BS ISO/IEC 11889-2:2009 | Information technology. Trusted platform module Design principles |
10/30237107 DC : DRAFT DEC 2010 | BS ISO/IEC 11770-5 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 5: GROUP KEY MANAGEMENT |
UNE-EN ISO 24534-4:2012 | Automatic vehicle and equipment identification - Electronic Registration Identification (ERI) for vehicles - Part 4: Secure communications using asymmetrical techniques (ISO 24534-4:2010) |
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015) |
BS EN 61162-460:2015 | Maritime navigation and radiocommunication equipment and systems. Digital interfaces Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security |
14/30302801 DC : 0 | BS ISO/IEC 11889-2 - INFORMATION TECHNOLOGY - TRUSTED PLATFORM MODULE - PART 2: STRUCTURES |
PD CEN ISO/TS 19299:2015 | Electronic fee collection. Security framework |
16/30329503 DC : 0 | BS ISO 19847 - SHIPS AND MARINE TECHNOLOGY - SHIPBOARD DATA SERVERS TO SHARE FIELD DATA AT SEA |
04/30093313 DC : DRAFT JUN 2004 | ISO/IEC 9798-6 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 6: MECHANISMS USING MANUAL DATA TRANSFER |
UNI CEN/TS 16439 : 2013 | ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK |
CSA ISO/IEC 15945 : 2004 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
16/30335688 DC : 0 | BS ISO/IEC 11770-4 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ISO/IEC 13157-4:2016 | Information technology Telecommunications and information exchange between systems NFC Security Part 4: NFC-SEC entity authentication and key agreement using asymmetric cryptography |
TS 101 438 : 7.2.0 | DIGITAL CELLULAR TELECOMMUNICATIONS SYSTEM (PHASE 2+); MOBILE STATION APPLICATION EXECUTION ENVIRONMENT (MEXE); FUNCTIONAL DESCRIPTION STAGE 2 |
ISO/IEC TR 14516:2002 | Information technology Security techniques Guidelines for the use and management of Trusted Third Party services |
CAN/CSA-ISO/IEC 29167-17:16 | Information technology Automatic identification and data capture techniques Part 17: Crypto suite cryptoGPS security services for air interface communications (Adopted ISO/IEC 29167-17:2015, first edition, 2015-06-01) |
S.R. CWA 16926-6:2015 | EXTENSIONS FOR FINANCIAL SERVICES (XFS) INTERFACE SPECIFICATION RELEASE 3.30 - PART 6: PIN KEYPAD DEVICE CLASS INTERFACE - PROGRAMMER'S REFERENCE |
UNI EN ISO 24534-4 : 2011 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 29150:2011 | Information technology — Security techniques — Signcryption |
ISO/IEC 14543-5-1:2010 | Information technology Home electronic system (HES) architecture Part 5-1: Intelligent grouping and resource sharing for Class 2 and Class 3 Core protocol |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
IEC PAS 63062:2016 | Maritime navigation and radiocommunication equipment and systems - Removable external data source (REDS) - General requirements, methods of testing and required test results |
I.S. EN ISO 24534-4:2010/A1:2019 | AUTOMATIC VEHICLE AND EQUIPMENT IDENTIFICATION - ELECTRONIC REGISTRATION IDENTIFICATION (ERI) FOR VEHICLES - PART 4: SECURE COMMUNICATIONS USING ASYMMETRICAL TECHNIQUES |
ISO/IEC 11889-4:2015 | Information technology Trusted Platform Module Library Part 4: Supporting Routines |
I.S. EN 50159:2010 | RAILWAY APPLICATIONS - COMMUNICATION, SIGNALLING AND PROCESSING SYSTEMS - SAFETY-RELATED COMMUNICATION IN TRANSMISSION SYSTEMS |
ISO/IEC 15444-8:2007 | Information technology — JPEG 2000 image coding system: Secure JPEG 2000 — Part 8: |
IEC 62280:2014 | Railway applications - Communication, signalling and processing systems - Safety related communication in transmission systems |
EN 50159:2010 | Railway applications - Communication, signalling and processing systems - Safety-related communication in transmission systems |
ISO 12855:2015 | Electronic fee collection Information exchange between service provision and toll charging |
IEC 62320-2:2016 | Maritime navigation and radiocommunication equipment and systems - Automatic identification system (AIS) - Part 2: AIS AtoN Stations - Operational and performance requirements, methods of testing and required test results |
UNE-ETSI/TS 101733 V1.2.2:2011 | Electronic signature formats. |
EN ISO 12855:2015 | Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
INCITS/ISO/IEC 9798-5 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENTITY AUTHENTICATION - PART 5: MECHANISMS USING ZERO-KNOWLEDGE TECHNIQUES |
UNI CEN/TS 15480-3 : 2014 | IDENTIFICATION CARD SYSTEMS - EUROPEAN CITIZEN CARD - PART 3: EUROPEAN CITIZEN CARD INTEROPERABILITY USING AN APPLICATION INTERFACE |
BS ISO/IEC 11889-1:2009 | Information technology. Trusted platform module Overview |
BS EN 62320-2:2017 | Maritime navigation and radiocommunication equipment and systems. Automatic identification system (AIS) AIS AtoN Stations. Operational and performance requirements, methods of testing and required test results |
BS ISO/IEC 9798-5:2009 | Information technology. Security techniques. Entity authentication Mechanisms using zero knowledge techniques |
BS IEC 62530:2011 | SystemVerilog. Unified hardware design, specification, and verification language |
DD CEN/TS 15480-3:2010 | Identification card systems. European citizen card European citizen card interoperability using an application interface |
06/30108755 DC : DRAFT FEB 2006 | ISO/IEC 14888-1 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - DIGITAL SIGNATURES WITH APPENDIX - PART 1: GENERAL |
BS ISO/IEC 14888-1:1998 | Information technology. Security techniques. Digital signatures with appendix General |
ISO/IEC 11770-4:2017 | Information technology — Security techniques — Key management — Part 4: Mechanisms based on weak secrets |
DD CEN ISO/TS 17574:2009 | Electronic fee collection. Guidelines for security protection profiles |
PD ISO/IEC TR 29149:2012 | Information technology. Security techniques. Best practices for the provision and use of time-stamping services |
BS ISO/IEC 18033-2 : 2006 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - ENCRYPTION ALGORITHMS - PART 2: ASYMMETRIC CIPHERS |
CSA ISO/IEC 15945 : 2004 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - SPECIFICATION OF TTP SERVICES TO SUPPORT THE APPLICATION OF DIGITAL SIGNATURES |
INCITS/ISO/IEC 29192-4 : 2014 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - LIGHTWEIGHT CRYPTOGRAPHY - PART 4: MECHANISMS USING ASYMMETRIC TECHNIQUES |
PD CEN/TS 16439:2013 | Electronic fee collection. Security framework |
BS ISO/IEC 9797-2:2011 | Information technology. Security techniques. Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
09/30199552 DC : DRAFT FEB 2009 | BS ISO/IEC 18014-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - TIME-STAMPING SERVICES - PART 3: MECHANISMS PRODUCING LINKED TOKENS |
BS EN 62940:2017 | Maritime navigation and radiocommunication equipment and systems. Integrated communication system (ICS). Operational and performance requirements, methods of testing and required test results |
07/30105115 DC : 0 | BS ISO/IEC 19772 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - AUTHENTICATED ENCRYPTION |
07/30161232 DC : 0 | BS ISO/IEC 11770-3 - INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 11889-2:16 | Information technology Trusted Platform Module Library Part 2: Structures (Adopted ISO/IEC 11889-2:2015, second edition, 2015-12-15) |
IEEE DRAFT 1363 : D13 99 | DRAFT STANDARD SPECIFICATIONS FOR PUBLIC KEY CRYPTOGRAPHY |
INCITS/ISO/IEC 11770-4 : 2008 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 13888-3:2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - NON-REPUDIATION - PART 3: MECHANISMS USING ASYMMETRIC TECHNIQUES |
CAN/CSA-ISO/IEC 11889-1:16 | Information technology Trusted Platform Module Library Part 1: Architecture (Adopted ISO/IEC 11889-1:2015, second edition, 2015-12-15) |
ISO/IEC 20009-4:2017 | Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets |
ISO 16609:2012 | Financial services — Requirements for message authentication using symmetric techniques |
TS 119 312 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); CRYPTOGRAPHIC SUITES |
ISO 9735-10:2014 | Electronic data interchange for administration, commerce and transport (EDIFACT) — Application level syntax rules (Syntax version number: 4, Syntax release number: 2) — Part 10: Syntax service directories |
TR 119 300 : 1.2.1 | ELECTRONIC SIGNATURES AND INFRASTRUCTURES (ESI); GUIDANCE ON THE USE OF STANDARDS FOR CRYPTOGRAPHIC SUITES |
ISO/IEC TR 29149:2012 | Information technology Security techniques Best practices for the provision and use of time-stamping services |
EN 62320-2:2017 | MARITIME NAVIGATION AND RADIOCOMMUNICATION EQUIPMENT AND SYSTEMS - AUTOMATIC IDENTIFICATION SYSTEM (AIS) - PART 2: AIS ATON STATIONS - OPERATIONAL AND PERFORMANCE REQUIREMENTS, METHODS OF TESTING AND REQUIRED TEST RESULTS (IEC 62320-2:2016) |
CEN/TS 15480-3:2014 | Identification card systems - European Citizen Card - Part 3: European Citizen Card Interoperability using an application interface |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
CSA ISO/IEC 11770-4 : 2007 : R2017 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CAN/CSA-ISO/IEC 25185-1:18 | Identification cards — Integrated circuit card authentication protocols — Part 1: Protocol for Lightweight Authentication of Identity (Adopted ISO/IEC 25185-1:2016, first edition, 2016-01-15) |
CSA ISO/IEC 11770-4 : 2007 : INC : COR 1 : 2010 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
INCITS/ISO/IEC 15444-8:2007[R2019] | Information technology - JPEG 2000 image coding system: Secure JPEG 2000<br> |
CSA ISO/IEC 11770-4 : 2007 : R2012 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
CSA ISO/IEC 11770-4 : 2007 | INFORMATION TECHNOLOGY - SECURITY TECHNIQUES - KEY MANAGEMENT - PART 4: MECHANISMS BASED ON WEAK SECRETS |
ANSI X9.79-1 : 2001 | FINANCIAL SERVICES PUBLIC KEY INFRASTRUCTURE - PART 1: PKI PRACTICES AND POLICY FRAMEWORK |
AS ISO/IEC 9797.2:2019 | Information technology - Security techniques - Message Authentication Codes (MACs) Mechanisms using a dedicated hash-function |
ISO/IEC 10118-1:2016 | Information technology Security techniques Hash-functions Part 1: General |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.