Search results

Search list

Results in:

1-10 of 14 results

Information security - Lightweight cryptography - Part 8: Authenticated encryption - Amendment 1

Information technology - Security techniques - Lightweight cryptography - Part 1: General - Amendment 1

Information technology - Security techniques - Lightweight cryptography - Part 4: Mechanisms using asymmetric techniques - Amendment 2

Identification cards - Integrated circuit cards - Part 15: Cryptographic information application - Amendment 2: Quantum safe cryptography

Identification cards - Integrated circuit cards - Part 4: Organization, security and commands for interchange - Amendment 2: Quantum safe cryptography

Cryptography

Cryptography and security mechanisms

Quantum Communication and Quantum Cryptography

QKD and PQC - An equitable analysis and comparison of both technologies

QKD and PQC - An equitable analysis and comparison of both technologies

TOP