【国际标准】 Information technology - Conformance test methods for security service crypto suites - Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
本网站 发布时间:
2025-08-20
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>
适用范围:
暂无
标准号:
ISO/IEC 19823-16:2020 EN
标准名称:
Information technology - Conformance test methods for security service crypto suites - Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
英文名称:
Information technology - Conformance test methods for security service crypto suites - Part 16: Crypto suite ECDSA-ECDH security services for air interface communications标准状态:
现行-
发布日期:
2020-10-26 -
实施日期:
出版语种:
EN
- 其它标准
- 上一篇: ISO/IEC 19823-13:2018 EN 0f2433f6 Information technology — Conformance test methods for security service crypto suites — Part 13: Cryptographic Suite Grain-128A
- 下一篇: ISO/IEC 19823-16:2020 EN fbde7dad Information technology — Conformance test methods for security service crypto suites — Part 16: Crypto suite ECDSA-ECDH security services for air interface communications
- 推荐标准
- IEC 62443-3-2:2020 EN d294ffd6 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-3-2:2020 EN-FR 84209ce0 Security for industrial automation and control systems - Part 3-2: Security risk assessment for system design
- IEC 62443-4-2:2019 EN-FR 793760b3 Security for industrial automation and control systems - Part 4-2: Technical security requirements for IACS components
- ISO/IEC 20008-1:2013 EN 61fdb4f7 Information technology — Security techniques — Anonymous digital signatures — Part 1: General
- ISO/IEC 20008-2:2013 EN 5a09bc4d Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key
- ISO/IEC 20008-2:2013/Amd 2:2023 EN 56bd1682 Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms using a group public key — Amendment 2
- ISO/IEC 20008-2:2013/AMD1:2021 EN a6ae0f3f Amendment 1 - Information technology - Security techniques - Anonymous digital signatures - Part 2: Mechanisms using a group public key
- ISO/IEC 20008-3:2024 EN 3c4adea3 Information security — Anonymous digital signatures — Part 3: Mechanisms using multiple public keys
- ISO/IEC 20009-3:2022 EN 048243db Information security - Anonymous entity authentication - Part 3: Mechanisms based on blind signatures
- ISO/IEC 20009-4:2017 EN bd45b46e Information technology — Security techniques — Anonymous entity authentication — Part 4: Mechanisms based on weak secrets
- ISO/IEC 20085-1:2019 EN 22d0081d IT Security techniques - Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules - Part 1: Test tools and techniques
- ISO/IEC 20085-2:2020 EN 1122da78 IT Security techniques - Test tool requirements and test tool calibration methods for use in testing non-invasive attack mitigation techniques in cryptographic modules - Part 2: Test calibration methods and apparatus
- ISO/IEC 20243-1:2023 EN 536fdfeb Information technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Part 1: Requirements and recommendations for mitigating maliciously tainted and counterfeit products
- ISO/IEC 20243-2:2023 EN 6157c454 Information technology — Open Trusted Technology ProviderTM Standard (O-TTPS) — Part 2: Assessment procedures for the O-TTPS
- ISO/IEC 20243-2:2023 EN 81d9d478 Information technology - Open Trusted Technology ProviderTM Standard (O-TTPS) - Part 2: Assessment procedures for the O-TTPS
我的标准
购物车
400-168-0010










