Cryptographic algorithms and security mechanisms conformance testing Read more about Cryptographic algorithms and security mechanisms conformance testing
Security requirements for cryptographic modules Read more about Security requirements for cryptographic modules
Guidance for developing security and privacy functional requirements based on ISO/IEC 15408 Read more about Guidance for developing security and privacy functional requirements based on ISO/IEC 15408
Secret sharing -- Part 2: Fundamental mechanisms Read more about Secret sharing -- Part 2: Fundamental mechanisms
Catalogue of architectural and design principles for secure products, systems and applications Read more about Catalogue of architectural and design principles for secure products, systems and applications
Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII Read more about Service level agreement (SLA) framework -- Part 4: Components of security and of protection of PII
Blind digital signatures -- Part 2: Discrete logarithm based mechanisms Read more about Blind digital signatures -- Part 2: Discrete logarithm based mechanisms
Blind digital signatures -- Part 1: General Read more about Blind digital signatures -- Part 1: General
Information technology -- Cloud computing -- Interacting with cloud service partners (CSNs) Read more about Information technology -- Cloud computing -- Interacting with cloud service partners (CSNs)