Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8233 - 8244 of 9037
Notice of Intent

Information technology - High efficiency coding...

This document provides accompanying reference software for Rec. ITU-T H.265 | ISO/IEC 23008-2 as an electronic attachment. The software is an integral part of this document. The use of this reference software is not required...
Notice of Intent

Information technology - Security techniques - ...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...
Notice of Intent

Information technology - Security techniques - ...

This document specifies the methods to be used by testing laboratories to test whether the cryptographic module conforms to the requirements specified in ISO/IEC 19790:2012. The methods are developed to provide a high degree...
Notice of Intent

Information technology - Security techniques - ...

This document establishes five modes of operation for applications of an n-bit block cipher (e.g. protection of data during transmission or in storage). The defined modes only provide protection of data confidentiality...
Notice of Intent

Amendment 3 - Information technology - Coding...

This part of ISO/IEC 14496 specifies MPEG-4 Animation Framework eXtension (AFX) model for representing and encoding 3D graphics assets to be used standalone or integrated in interactive multimedia presentations (the latter...
Notice of Intent

Amendment 4 - Information technology - Coding...

This part of ISO/IEC 14496 specifies MPEG-4 Animation Framework eXtension (AFX) model for representing and encoding 3D graphics assets to be used standalone or integrated in interactive multimedia presentations (the latter...
Notice of Intent

Information technology - Programming languages...

1 This document specifies the form and establishes the interpretation of programs written in the C programming language.1) It specifies — the representation of C programs; — the syntax and constraints of the C language; — the...
Notice of Intent

IT Security techniques - Hash-functions - Part...

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash- functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent

IT Security techniques - Digital signatures with...

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...