ISO/IEC-9798-2 Complete Document History
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption

Complete Current Edition:
   4TH EDITION - Part 2: Mechanisms using authenticated encryption - June 1, 2019

Obsolete Revision Information:
   3RD EDITION CORRIGENDUM 3 - TECHNICAL CORRIGENDUM 3 FOR 3RD EDITION - Feb. 15, 2013
   3RD EDITION CORRIGENDUM 2 - TECHNICAL CORRIGENDUM 2 FOR 3RD EDITION - March 15, 2012
   3RD EDITION CORRIGENDUM 1 - TECHNICAL CORRIGENDUM 1 FOR 3RD EDITION - Feb. 15, 2010
   3RD EDITION - Part 2: Mechanisms using symmetric encipherment algorithms - Dec. 15, 2008
   2ND EDITION CORRIGENDUM 1 - CORRIGENDUM 1 FOR 2ND EDITION - Feb. 1, 2004
   2ND EDITION - Part 2: Mechanisms using symmetric encipherment algorithms - July 15, 1999
   1ST EDITION - Part 2: Mechanisms using symmetric encipherment algorithms - Dec. 15, 1994