Search results

Search list

Results in:

1-10 of 11 results

Information technology - Conformance test methods for security service crypto suites - Part 21: Crypto suite SIMON

Information technology - Conformance test methods for security service crypto suites - Part 22: Crypto suite SPECK

Information technology - Conformance test methods for security service crypto suites - Part 16: Crypto suite ECDSA-ECDH

Information technology - Conformance test methods for security service crypto suites - Part 11: Crypto suite PRESENT-80

Information technology - Conformance test methods for security service crypto suites - Part 10: Crypto suite AES-128

Information technology - Conformance test methods for security service crypto suites - Part 13: Cryptographic Suite Grain-128A

Information technology - Automatic identification and data capture techniques - Part 21: Crypto suite SIMON security services for air interface communications

Information technology - Automatic identification and data capture techniques - Part 22: Crypto suite SPECK security services for air interface communications

Information technology - Automatic identification and data capture techniques - Part 10: Crypto suite AES-128 security services for air interface communications

Information technology - Automatic identification and data capture techniques - Part 11: Crypto suite PRESENT-80 security services for air interface communications

TOP