Information technology — Security techniques — Key management — Part 5: Group key management
1
Scope
This part of ISO/IEC 11770 specifies key establishment mechanisms for multiple entities to provide procedures for handling cryptographic keying material used in symmetric or asymmetric cryptographic algorithms according to the security policy in force.
It defines symmetric key based key establishment mechanisms for multiple entities with a key distribution centre (KDC), and defines…
Information technology — Generic coding of moving pictures and associated audio information — Part 1...
1.1 Scope
This Recommendation | International Standard specifies the system layer of the coding. It was developed principally to support the combination of the video and audio coding methods defined in Parts 2 and 3 of ISO/IEC 13818. The system layer supports six basic functions:
1) the synchronization of multiple compressed streams on decoding;
2) the interleaving of multiple compressed…
Information technology — Lossy/lossless coding of bi-level images
1 Scope
This Recommendation | International Standard1 defines methods for coding bi-level images and sets of images (documents consisting of multiple pages). It is particularly suitable for bi-level images consisting of text and dithered (halftone) data.
The methods defined permit lossless (bit-preserving) coding, lossy coding, and progressive coding. In progressive coding, the first image is…
Information technology — Coding of audio-visual objects — Part 22: Open font format
1 Scope
This document specifies the Open Font Format (OFF) specification, including the TrueType and Compact
Font Format (CFF) outline formats. Many references to both TrueType and PostScript exist throughout this
document, as Open Font Format fonts combine the two technologies. The document defines data structures
for variaous font tables, and provides the necessary details for developers to…
Information technology — International string ordering and comparison — Method for comparing charact...
1 Scope
This document defines the following.
— A reference comparison method. This method is applicable to two character strings to determine their collating order in a sorted list. The method can be applied to strings containing characters from the full repertoire of ISO/IEC 10646. This method is also applicable to subsets of that repertoire, such as those of the different ISO/IEC 8-bit…
Systems and software engineering — Systems and software assurance — Part 1: Concepts and vocabulary
1 Scope
This document defines assurance-related terms and establishes an organized set of concepts and
relationships to form a basis for shared understanding across user communities for assurance. It
provides information to users of the other parts of ISO/IEC/IEEE 15026 including the combined use
of multiple parts. The essential concept introduced by ISO/IEC/IEEE 15026 (all parts) is the…
Information technology — Automatic identification and data capture techniques — Unique identificatio...
1 Scope
This part of ISO/IEC 15459 specifies a unique string of characters for the identification of individual products and product packages. The character string is intended to be represented in a linear bar code symbol or two-dimensional symbol or other AIDC media attached to the entity to meet management needs. To address management needs different classes of identities are recognized in the…
Information technology — Security techniques — Cryptographic techniques based on elliptic curves — P...
1 Scope
The ISO/IEC 15946 series specifies public-key cryptographic techniques based on elliptic curves described in ISO/IEC 15946-1.
This document defines elliptic curve generation techniques useful for implementing the elliptic curve based mechanisms defined in ISO/IEC 29192-4, ISO/IEC 9796-3, ISO/IEC 11770-3, ISO/IEC 14888-3 and ISO/IEC 18033-2.
This document is applicable to cryptographic…
IT Security techniques — Encryption algorithms — Part 6: Homomorphic encryption
1 Scope
This document specifies the following mechanisms for homomorphic encryption.
— Exponential ElGamal encryption;
— Paillier encryption.
For each mechanism, this document specifies the process for:
— generating parameters and the keys of the involved entities;
— encrypting data;
— decrypting encrypted data; and
— homomorphically operating on encrypted data.
Annex A defines the…
Information technology — Telecommunications and information exchange between systems — Local and met...
1.1 Scope
This standard defines several media independent services (MIS); handover, home energy management
system (HEMS), software-defined radio access networks (SDRANs), radio resource management (RRM),
and device-to-device (D2D) communication that shall be implemented in conjunction with the MIS
framework as defined in IEEE Std 802.21™-2017 to optimize the performance of such services.