# IEC - International Electrotechnical Commission - ISO/IEC 11770-3:2008

## Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques

revised
 Organization: IEC - International Electrotechnical Commission Publication Date: 2 July 2008 Status: revised Page Count: 83 ICS Code (IT Security): 35.030
##### abstract:

ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following... View More

### Document History

December 1, 2017
Amendment 1 - Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques - Blinded Diffie-Hellman key agreement
A description is not available for this item.
May 9, 2016
Corrigendum 1 - Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
A description is not available for this item.
August 4, 2015
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
ISO/IEC 11770-3:2015 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals: a)...
September 4, 2009
Corrigendum 1 - Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques -
A description is not available for this item.
ISO/IEC 11770-3:2008
July 2, 2008
Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques
ISO/IEC 11770-3:2008 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following...
November 11, 1999
Information technology -- Security techniques -- Key management -- Part 3: Mechanisms using asymmetric techniques
A description is not available for this item.