【国际标准】 Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
本网站 发布时间:
2025-08-20
开通会员免费在线看70000余条国内标准,赠送文本下载次数,单本最低仅合13.3元!还可享标准出版进度查询、定制跟踪推送、标准查新等超多特权!  
查看详情>>
适用范围:
暂无
标准号:
ISO/IEC 10118-3:2004 EN
标准名称:
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions
英文名称:
Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions标准状态:
废止-
发布日期:
2004-02-24 -
实施日期:
出版语种:
EN
- 其它标准
- 上一篇: ISO/IEC 10118-3:2004 EN 2c70911b Information technology -- Security techniques -- Hash-functions -- Part 3: Dedicated hash-functions
- 下一篇: ISO/IEC 10118-3:2004/Amd 1:2006 EN 4bc1e23a Information technology — Security techniques — Hash-functions — Part 3: Dedicated hash-functions — Amendment 1: Dedicated Hash-Function 8 (SHA-224)
- 推荐标准
- ISO/TR 23249:2022 EN cde6735a Blockchain and distributed ledger technologies – Overview of existing DLT systems for identity management
- ISO/TR 6039:2023 EN e3a81731 Blockchain and distributed ledger technologies — Identifiers of subjects and objects for the design of blockchain systems
- ISO/TS 23258:2021 EN 2da5874d Blockchain and distributed ledger technologies — Taxonomy and Ontology
- ISO/TS 23635:2022 EN bddb24ca Blockchain and distributed ledger technologies — Guidelines for governance
- ISO/TS 24574:2025 EN ad341f00 Document management applications — Specification for a digital safe
- ISO/IEC 21878:2018 EN 975debeb Information technology - Security techniques - Security guidelines for design and implementation of virtualized servers
- ISO/IEC 21878:2018 EN f91703d8 Information technology — Security techniques — Security guidelines for design and implementation of virtualized servers
- ISO/IEC 21964-1:2018 EN 7df746cc Information technology — Destruction of data carriers — Part 1: Principles and definitions
- ISO/IEC 21964-1:2018 EN 889c16da Information technology - Destruction of data carriers - Part 1: Principles and definitions
- ISO/IEC 21964-2:2018 EN dd1a551b Information technology — Destruction of data carriers — Part 2: Requirements for equipment for destruction of data carriers
- ISO/IEC 21964-2:2018 EN f1aa3ac1 Information technology - Destruction of data carriers - Part 2: Requirements for equipment for destruction of data carriers
- ISO/IEC 21964-3:2018 EN 3184d2cc Information technology - Destruction of data carriers - Part 3: Process of destruction of data carriers
- ISO/IEC 23264-1:2021 EN 91702f31 Information security - Redaction of authentic data - Part 1: General
- ISO/IEC 23264-2:2024 EN 82415c1d Information security — Redaction of authentic data — Part 2: Redactable signature schemes based on asymmetric mechanisms
- ISO/IEC 23837-2:2023 EN 5b96fefc Information security - Security requirements, test and evaluation methods for quantum key distribution - Part 2: Evaluation and testing methods
我的标准
购物车
400-168-0010










