Search results

Search list

Results in:

1-10 of 191 results
Standards [CURRENT]

DIN 31647

Information and documentation - Preservation of evidence of cryptographically signed documents
Edition 2015-05

Standards [CURRENT]

DIN EN 419221-5

Protection Profiles for TSP Cryptographic Modules - Part 5: Cryptographic Module for Trust Services; English version EN 419221-5:2018
Edition 2018-07

Standards [CURRENT]

DIN EN ISO/IEC 19790

Information technology - Security techniques - Security requirements for cryptographic modules (ISO/IEC 19790:2012, Corrected version 2015-12); German version EN ISO/IEC 19790:2020
Edition 2020-08

Technical Specification [CURRENT]

DIN CEN/TS 419221-1 ; DIN SPEC 16572-1:2016-10

Protection Profiles for TSP cryptographic modules - Part 1: Overview; English version CEN/TS 419221-1:2016
Edition 2016-10

Technical Specification [CURRENT]

DIN CEN/TS 419221-2 ; DIN SPEC 16572-2:2016-10

Protection Profiles for TSP cryptographic modules - Part 2: Cryptographic module for CSP signing operations with backup; English version CEN/TS 419221-2:2016
Edition 2016-10

Technical Specification [CURRENT]

DIN CEN/TS 419221-3 ; DIN SPEC 16572-3:2016-10

Protection Profiles for TSP Cryptographic modules - Part 3: Cryptographic module for CSP key generation services; English version CEN/TS 419221-3:2016
Edition 2016-10

Technical Specification [CURRENT]

DIN CEN/TS 419221-4 ; DIN SPEC 16572-4:2016-10

Protection Profiles for TSP cryptographic modules - Part 4: Cryptographic module for CSP signing operations without backup; English version CEN/TS 419221-4:2016
Edition 2016-10

Standards [CURRENT]

ISO/IEC 7816-15

Identification cards - Integrated circuit cards - Part 15: Cryptographic information application
Edition 2016-05

Standards [CURRENT]

ISO/IEC 7816-15 AMD 1

Identification cards - Integrated circuit cards - Part 15: Cryptographic information application; Amendment 1
Edition 2018-06

Standards [CURRENT]

ISO/IEC 9798-4

Information technology - Security techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check function
Edition 1999-12

TOP