Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Document status: Active
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Document status: Active
Information security - Message authentication codes (MACs) - Part 2: Mechanisms using a dedicated hash-function
Document status: Active
Information technology - Security techniques - Message Authentication Codes (MACs) - Part 3: Mechanisms using a universal hash-function
Document status: Active
Information technology - Security techniques - Entity authentication - Part 1: General
Document status: Active
Information technology - Security techniques - Entity authentication - Part 1: General
Document status: Active
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
Document status: Active
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms
Document status: Active