IEC - International Electrotechnical Commission - ISO/IEC 9798-2:2008/COR3:2013

Corrigendum 3 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -

revised
Buy Now
Organization: IEC - International Electrotechnical Commission
Publication Date: 13 February 2013
Status: revised
Page Count: 2
ICS Code (IT Security): 35.030

Document History

June 5, 2019
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
This document specifies entity authentication mechanisms using authenticated encryption algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third...
ISO/IEC 9798-2:2008/COR3:2013
February 13, 2013
Corrigendum 3 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.
Corrigendum 2 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.
Corrigendum 1 - Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms -
A description is not available for this item.
December 9, 2008
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted...
July 22, 1999
Information technology -- Security techniques -- Entity authentication -- Part 2: Mechanisms using symmetric encipherment algorithms
A description is not available for this item.
Advertisement