관심표준 등록 : 표준업데이트 시 알림을 받을 수 있습니다.
PDF : 직접 파일 다운로드 및 인쇄 (마이페이지 확인)
PRINT : 인쇄본 우편발송, 2~3일 소요(PDF파일 미제공)
분야 | ISO/IEC JTC 1/SC 27 : Information security, cybersecurity and privacy protection |
---|---|
적용범위 | |
국제분류(ICS)코드 | 35.030 : IT 보안 |
페이지수 | 34 |
Edition | 1.0 |
No. | 표준번호 | 표준명 | 발행일 | 상태 |
---|---|---|---|---|
1 | CSA ISO/IEC 14888-3:19 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms (Adopted ISO/IEC 14888-3:2018, fourth edition, 2018-11) | 2019-01-01 | 표준 |
2 | ISO/IEC 14888-3:2018 | IT Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2018-11-12 | 표준 |
3 | ISO/IEC 14888-3:2018 | IT Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2018-11-12 | 표준 |
4 | ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2016-03-17 | 구판 |
5 | ISO/IEC 14888-3:2016 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2016-03-17 | 구판 |
6 | ISO/IEC 14888-3:2006/AMD2:2012 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 2: Optimizing hash inputs | 2012-06-27 | 구판 |
7 | ISO/IEC 14888-3:2006/Amd 2:2012 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 2: Optimizing hash inputs | 2012-06-27 | 구판 |
8 | ISO/IEC 14888-3:2006/Amd 1:2010 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms — Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | 2010-06-04 | 구판 |
9 | ISO/IEC 14888-3:2006/AMD1:2010 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Amendment 1: Elliptic Curve Russian Digital Signature Algorithm, Schnorr Digital Signature Algorithm, Elliptic Curve Schnorr Digital Signature Algorithm, and Elliptic Curve Full Schnorr Digital Signature Algorithm | 2010-06-04 | 구판 |
10 | ISO/IEC 14888-3:2006/COR2:2009 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 2 | 2009-02-16 | 구판 |
11 | ISO/IEC 14888-3:2006/Cor 2:2009 | 2009-02-16 | 구판 | |
12 | ISO/IEC 14888-3:2006/COR1:2007 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms - Technical Corrigendum 1 | 2007-08-16 | 구판 |
13 | ISO/IEC 14888-3:2006/Cor 1:2007 | 2007-08-16 | 구판 | |
14 | ISO/IEC 14888-3:2006 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms | 2006-11-13 | 구판 |
15 | ISO/IEC 14888-3:2006 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Discrete logarithm based mechanisms | 2006-11-13 | 구판 |
16 | ISO/IEC 14888-3:1998/COR1:2001 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms - Technical Corrigendum 1 | 2001-10-04 | 구판 |
17 | ISO/IEC 14888-3:1998/Cor 1:2001 | 2001-10-04 | 구판 | |
18 | ISO/IEC 14888-3:1998 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Certificate-based mechanisms | 1998-12-20 | 구판 |
19 | ISO/IEC 14888-3:1998 | Information technology - Security techniques - Digital signatures with appendix - Part 3: Certificate-based mechanisms | 1998-12-20 | 구판 |
ISO/IEC 14888-2:2008 - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms 상세보기
ISO/IEC 14888-1:2008 - Information technology - Security techniques - Digital signatures with appendix - Part 1: General 상세보기
ISO/IEC 14888-1:2008 - Information technology — Security techniques — Digital signatures with appendix — Part 1: General 상세보기
ISO/IEC 14888-2:2008 - Information technology — Security techniques — Digital signatures with appendix — Part 2: Integer factorization based mechanisms 상세보기
CSA ISO/IEC 14888-2:09 (R2019) - Information technology - Security techniques - Digital signatures with appendix - Part 2: Integer factorization based mechanisms (Adopted ISO/IEC 14888-2:2008, second edition, 2008-04-15) 상세보기
함께 구입한 상품이 존재하지 않습니다.
IEC TS 63134:2020 - Active assisted living (AAL) use cases 상세보기
IEC 60034-5:2020 RLV - Rotating electrical machines - Part 5: Degrees of protection provided by the integral design of rotating electrical machines (IP code) - Classification 상세보기
KS B ISO TS 25740-1 - 에스컬레이터 및 무빙워크에 대한 안전요건 — 제1부: 세계공통 필수 안전요건(GESRs) 상세보기
KS B ISO TS 8100-21 - 승객 및 화물 운송용 엘리베이터 —제21부: 세계공통 필수안전요건(GESRs)을 충족하는 세계공통 안전 파라미터(GSPs) 상세보기
KS C IEC TS 62872 - 산업 시설과 스마트 그리드 사이의 산업 공정 측정, 제어 및 자동화 시스템 인터페이스 상세보기