IEC - International Electrotechnical Commission - ISO/IEC 9798-2:2008/COR3:2013
Corrigendum 3 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
revised
Buy Now
Organization: | IEC - International Electrotechnical Commission |
Publication Date: | 13 February 2013 |
Status: | revised |
Page Count: | 2 |
ICS Code (IT Security): | 35.030 |
Document History

June 5, 2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third...

ISO/IEC 9798-2:2008/COR3:2013
February 13, 2013
Corrigendum 3 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.

March 5, 2012
Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.

February 5, 2010
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.

December 9, 2008
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted...

July 22, 1999
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
A description is not available for this item.