Identification cards - Integrated circuit cards - Part 8: Commands and mechanisms for security operations
The choice and conditions of use of cryptographic mechanism in security operations can affect card exportability. The evaluation of the suitability of algorithms and protocols is outside the scope of this document. It does not cover the internal implementation within the card and/or the outside world.
|Publication type||International Standard|
|TC/SC||ISO/IEC JTC 1/SC 17 - Cards and security devices for personal identificationrss|
|ICS||35.240 - Applications of information technology|
35.240.15 - Identification cards and related devices
|File size||1197 KB|
The following test report forms are related:
Share your publications
Learn how to share your publications with your colleagues, using networking options.
Our prices are in Swiss francs (CHF). We accept all major credit cards (American Express, Mastercard and Visa), PayPal and bank transfers as form of payment.
Keep in touch
Keep up to date with new publication releases and announcements with our free IEC Just Published email newsletter.
Contact customer services
Please send your enquiry by email or call us on +41 22 919 02 11 between 09:00 – 17:00 CET Monday to Friday.