Information technology - Security techniques - Modes of operation for an n-bit block cipher
Document status: Active
- Amendment 1: CTR-ACPKM mode of operation
Document status: Active
Information technology - Security techniques - Modes of operation for an n-bit block cipher
Document status: Active
Information technology - Modes of operation for an n-bit block cipher algorithm - Corrigendum
Document status: Active
Corrigendum 1 - Information technology -- Security techniques -- Modes of operation for an n-bit block cipher -
Document status: Active
Information technology -- Security techniques -- Hash-functions -- Part 1: General
Document status: Active
- Amendment 1: Padding methods for sponge functions
Document status: Active
Information technology -- Security techniques -- Hash-functions -- Part 2: Hash-functions using an n-bit block cipher
Document status: Active
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher
Document status: Active
Information technology - Security techniques - Hash-functions - Part 2: Hash-functions using an n-bit block cipher algorithm - Corrigendum
Document status: Active