Document Center is acquired by Nimonik
VIEW CART
·
CONTACT
·
HOME
Find Standards By
SUBJECT
INDUSTRY SECTOR
ASTM VOLUME
US GOVERNMENT FSC CODE
PRODUCTS & SERVICES
OUR PRODUCTS
OTHER SERVICES
OUR POLICIES
HOW TO ORDER
COPYRIGHT COMPLIANCE
ALL ABOUT STANDARDS
THE BASICS
STANDARDS U.
NIMONIK BLOG
ABOUT DOCUMENT CENTER
WHAT OUR CUSTOMERS SAY
LOGIN
REGISTER
ISO/IEC-9798-2
›
Complete Document History
IT Security techniques - Entity authentication - Part 2: Mechanisms using authenticated encryption
How to Order
Standards We Provide
Updating, Reporting, Audits
Copyright Compliance
Complete Current Edition:
4TH EDITION - Part 2: Mechanisms using authenticated encryption - June 1, 2019
Obsolete Revision Information:
3RD EDITION CORRIGENDUM 3 - TECHNICAL CORRIGENDUM 3 FOR 3RD EDITION - Feb. 15, 2013
3RD EDITION CORRIGENDUM 2 - TECHNICAL CORRIGENDUM 2 FOR 3RD EDITION - March 15, 2012
3RD EDITION CORRIGENDUM 1 - TECHNICAL CORRIGENDUM 1 FOR 3RD EDITION - Feb. 15, 2010
3RD EDITION - Part 2: Mechanisms using symmetric encipherment algorithms - Dec. 15, 2008
2ND EDITION CORRIGENDUM 1 - CORRIGENDUM 1 FOR 2ND EDITION - Feb. 1, 2004
2ND EDITION - Part 2: Mechanisms using symmetric encipherment algorithms - July 15, 1999
1ST EDITION - Part 2: Mechanisms using symmetric encipherment algorithms - Dec. 15, 1994