Standard Number | BS ISO/IEC 11770-3:2015+A1:2017 |
Title | Information technology. Security techniques. Key management. Part 3: Mechanisms using asymmetric techniques |
Status | Current, Under review |
Publication Date | 31 August 2015 |
Normative References(Required to achieve compliance to this standard) | ISO/IEC 19772, ISO/IEC 11770-6, IEC 10118, IEC 15946-1, IEC 18031, IEC 11770-1 |
Informative References(Provided for Information) | IEC 18031:2011, ISO/IEC 8824, IETF RFC 2246:1999, IEC 9796-3:2006, IEC 14888, IEEE 1363, ITU-T Rec. X.690, IETF RFC 6509:2012, IEC 29150:2011, IEC 11770-6, IEC 9798-3, IEC 9797, ANSI X9.42-2001, IEC 9594-8:2008, ANSI X9.63, ISO/IEC 8825, IEC 9796-2:2010, ITU-T Rec. X.680, ISO/IEC 10181-1:1996, ISO 7498-2:1989 |
International Relationships | ERROR,ISO/IEC 11770-3:2015/Amd 1:201 |
Amended By | Amendment, January 2018; Corrigendum, July 2016 |
Draft Superseded By | 17/30352205 DC |
Descriptors | Data storage protection, Algorithms, Asymmetrical, Tokens (data transmission), Data processing, Coding (programming), Data security, Cryptography, Keys (cryptographic), Data management, Information exchange |
ICS | 35.030
|
Title in French | Technologies de l'information. Techniques de sécurité. Gestion de clés Mécanismes utilisant des techniques asymétriques |
Committee | IST/33/2 |
ISBN | 978 0 580 96554 8 |
Publisher | BSI |
Format | A4 |
Delivery | Yes |
Pages | 96 |
File Size | 6.475 MB |
Price | £280.00 |