1. ISO/IEC 9798-2 - Information Technology - Security Techniques - Entity authentication - Part 2: Mechanisms using symmetric encipherment algorithms 2. ISO/IEC 9798-3 - Information Technology - Security Techniques - Entity authentication - Part 3: Mechanisms using digital signature techniques 3. ISO/IEC 9798-4 - Information Technology - Security Techniques - Entity authentication - Part 4: Mechanisms using a cryptographic check 4. ISO/IEC 9798-5 - Information Technology - Security Techniques - Entity authentication - Part 5: Mechanisms using zero-knowledge techniques 5. ISO/IEC 9798-6 - Information Technology - Security Techniques - Entity authentication - Part 6: Mechanisms using manual data transfer 6. ISO/IEC 11770-2 - Information Technology - Security Techniques - Key management - Part 2: Mechanisms using symmetric techniques 7. ISO/IEC 11770-3 - Information Technology - Security Techniques - Key management - Part 3: Mechanisms using asymmetric techniques 8. ISO/IEC 11770-4 - Information Technology - Security Techniques - Key management - Part 4: Key establishment mechanisms based on weak secrets |