Electrotechincal

Electrotechincal



KS ISO/IEC 20009-3:2022

Information security - Anonymous entity authentication - Part 1: Mechanisms based on blind signatures

Provides general descriptions and specifications of anonymous entity authentication mechanisms based on blind digital signatures...

Kes 3,308.00

KS ISO/IEC 18033-7:2022

Information security - Encryption algorithms - Part 7: Tweakable block ciphers

Specifies tweakable block ciphers. A tweakable block cipher is a family of n-bit permutations parametrized by a secret key value and a public tweak value..

Kes 3,308.00

KS ISO/IEC 11770-7:2021

Information security - Key management - Part 7: Cross-domain password-based authenticated key exchange

Specifies mechanisms for cross-domain password-based authenticated key exchange, all of which are four-party password-based authenticated key exchange (4PAKE) protocols..

Kes 3,605.00

KS ISO/IEC 29192-8:2022

Information security - Lightweight cryptography - protocols - Part 8: Authenticated encryption

Specifies one method for authenticated encryption suitable for applications requiring lightweight cryptographic mechanisms...

Kes 3,308.00

KSISO/IEC9797-2:2021

Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function

Specifies MAC algorithms that use a secret key and a hash-function (or its roundfunction or sponge function) to calculate an m-bit MAC...

Kes 4,820.00

KS ISO/IEC 23264-1:2021

Information security - Redaction of authentic data - Part 1: General

Specifies properties of cryptographic mechanisms to redact authentic data. In particular, it defines the processes involved in those mechanisms, the participating parties, and the cryptographic properties...

Kes 3,038.00

KSISO/IEC4922-1:2023

Information security - Secure multiparty computation - Part 1: General

Specifies definitions, terminology and processes for secure multiparty computation and related technology, in order to establish a taxonomy and enable interoperability...

Kes 3,038.00

KS ISO/IEC 23837-1:2023

Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 1: Requirements

Specifies a general framework for the security evaluation of quantum key distribution (QKD) according to the ISO/IEC 15408 series. ..

Kes 4,820.00

KSISO/IEC 27102:2019

Information security management - Guidelines for cyber-insurance

Provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organizations information security risk management framework..

Kes 3,308.00

KS ISO/IEC 20897-1:2020

Information security, cybersecurity and privacy protection Physically unclonable functions Part 1: Security requirements

Specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs..

Kes 3,308.00

Showing 801 to 810 of 913 (92 Pages)