Search

Refine Results
Type
Program
Status
Country
Province
City
Period range

From

To

Displaying 2629 - 2640 of 5449
Notice of Intent

Information technology - Security techniques - ...

This document specifies key derivation functions, i.e. functions which take secret information and other (public) parameters as input and output one or more “derived” secret keys. Key derivation functions based on MAC...
Notice of Intent

Information technology - Coding of audio-visual...

This document describes the carriage of some forms of timed text and subtitle streams in files based on ISO/IEC 14496-12 (the ISO base media file format). The documentation of these forms does not preclude other definition of...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC 18033 specifies identity-based encryption mechanisms. For each mechanism the functional interface, the precise operation of the mechanism, and the ciphertext format are specified. However, conforming...
Notice of Intent

IT Security techniques - Encryption algorithms...

This document specifies the following mechanisms for homomorphic encryption. — Exponential ElGamal encryption; — Paillier encryption. For each mechanism, this document specifies the process for: — generating parameters and...
Notice of Intent

Information technology - Security techniques - ...

This document specifies principles, including a general model, a set of entities, a number of processes, and general requirements for blind digital signature mechanisms, as well as the following variants of blind digital...
Notice of Intent

Information technology - Security techniques - ...

ISO/IEC 19592 (all parts) specifies cryptographic secret sharing schemes and their properties. This document defines the parties involved in a secret sharing scheme, the terminology used in the context of secret sharing...
Notice of Intent

IT security techniques - Competence requirements...

This document defines terms and establishes an organized set of concepts and relationships to understand the competency requirements for information security assurance conformance-testing and evaluation specialists, thereby...