Publication CODE |
Title |
ISO/IEC 15946-1:2008/COR2:2014 (2014-03) |
CORRIGENDUM 2 - INFORMATION TECHNOLOGY -- SECURITY TECHNIQUES -- CRYPTOGRAPHIC TECHNIQUES BASED ON ELLIPTIC CURVES -- PART 1: GENERAL |
|
Price Excl. VAT |
Total number of pages, tables and drawings |
0.00 €
|
2. |
Description
[Text at this stage is not available in English]
|
Class |
C990
(IEC PUBLICATIONS IEC PUBLICATIONS)
|
Available files
|
|
ATTENTION: With some browsers, you may experience problems if you open the downloaded file directly. If you experience this problem, please first save the file locally and then open it |
Committee |
ISO/IEC JTC 1/SC 27
IT SECURITY TECHNIQUES
|
BEC Approval |
2014-03-24 |
ICS-Code (International Standards Classification) |
35.030
|
NBN Status |
New |
|
IEC publication date |
2014-03-24 |
IEC file modification date |
2016-07-12 |
IEC last modification date |
2016-07-12 |
|