Specifies properties of cryptographic mechanisms to redact authentic data. In particular,
it defines the processes involved in those mechanisms, the participating parties, and the cryptographic
properties...
Specifies definitions, terminology and processes for secure multiparty computation
and related technology, in order to establish a taxonomy and enable interoperability...
Provides guidelines when considering purchasing cyber-insurance as a risk treatment
option to manage the impact of a cyber-incident within the organizations information security risk
management framework..
Specifies the security requirements for physically unclonable functions (PUFs). Specified
security requirements concern the output properties, tamper-resistance and unclonability of a single
and a batch of PUFs..
Defines the minimum actions to be performed by an evaluator in order to conduct an ISO/IEC
15408 series evaluation, using the criteria and evaluation evidence defined in the ISO/IEC 15408 series...
Defines the required structure and content of security functional components for the
purpose of security evaluation. It includes a catalogue of functional components that meets the common
security functionality requirements of many IT products...