Electrotechincal
Electrotechincal
KS ISO/IEC 20009-3:2022
Information security - Anonymous entity authentication - Part 1: Mechanisms based on blind signatures
Provides general descriptions and specifications of anonymous entity authentication mechanisms based on blind digital signatures...
Kes 3,308.00
KS ISO/IEC 18033-7:2022
Information security - Encryption algorithms - Part 7: Tweakable block ciphers
Specifies tweakable block ciphers. A tweakable block cipher is a family of n-bit permutations parametrized by a secret key value and a public tweak value..
Kes 3,308.00
KS ISO/IEC 11770-7:2021
Information security - Key management - Part 7: Cross-domain password-based authenticated key exchange
Specifies mechanisms for cross-domain password-based authenticated key exchange, all of which are four-party password-based authenticated key exchange (4PAKE) protocols..
Kes 3,605.00
KS ISO/IEC 29192-8:2022
Information security - Lightweight cryptography - protocols - Part 8: Authenticated encryption
Specifies one method for authenticated encryption suitable for applications requiring lightweight cryptographic mechanisms...
Kes 3,308.00
KSISO/IEC9797-2:2021
Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Specifies MAC algorithms that use a secret key and a hash-function (or its roundfunction or sponge function) to calculate an m-bit MAC...
Kes 4,820.00
KS ISO/IEC 23264-1:2021
Information security - Redaction of authentic data - Part 1: General
Specifies properties of cryptographic mechanisms to redact authentic data. In particular, it defines the processes involved in those mechanisms, the participating parties, and the cryptographic properties...
Kes 3,038.00
KSISO/IEC4922-1:2023
Information security - Secure multiparty computation - Part 1: General
Specifies definitions, terminology and processes for secure multiparty computation and related technology, in order to establish a taxonomy and enable interoperability...
Kes 3,038.00
KS ISO/IEC 23837-1:2023
Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 1: Requirements
Specifies a general framework for the security evaluation of quantum key distribution (QKD) according to the ISO/IEC 15408 series. ..
Kes 4,820.00
KSISO/IEC 27102:2019
Information security management - Guidelines for cyber-insurance
Provides guidelines when considering purchasing cyber-insurance as a risk treatment option to manage the impact of a cyber-incident within the organizations information security risk management framework..
Kes 3,308.00
KS ISO/IEC 20897-1:2020
Information security, cybersecurity and privacy protection Physically unclonable functions Part 1: Security requirements
Specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs..
Kes 3,308.00