Identification cards -- Integrated circuit cards -- Part 15: Cryptographic information application -- Amendment 1: Examples of the use of the cryptographic information application— 44 стр.
Information technology -- Security techniques -- Cryptographic techniques based on elliptic curves -- Part 1: General -- Technical Corrigendum 2— 2 стр.
Information technology -- Security techniques -- Cryptographic techniques based on elliptic curves -- Part 1: General -- Technical Corrigendum 1— 1 стр.