Code of China Chinese Standard Classification Professional Classification ICS Classification Latest
LoginRegister
Position: Search valid to be valid superseded to be superseded abolished to be abolished
Standard No. Title Price(USD) Delivery Status Add to Cart
GB/Z 36442.3-2018 Information technology—Radio frequency identification for item management—Implementation guidelines—Part 3: Implementation and operation of UHF RFID interrogators system in logistics applications $430.00 via email in 1~5 business day valid
GB/Z 38649-2020 Information security technology -- Guide of information security assurance framework for smart cities $540.00 via email in 1~5 business day valid
GM/T 0001.1-2012 ZUC stream cipher algorithm--Part 1: Description of the algorithm $140.00 via email in 1~3 business day valid
GM/T 0001.2-2012 ZUC stream cipher algorithm--Part 2: The ZUC-based confidentiality algorithm $140.00 via email in 1~3 business day valid
GM/T 0001.3-2012 ZUC stream cipher algorithm--Part 3: The ZUC-based integrity algorithm $140.00 via email in 1~3 business day valid
GM/T 0002-2012 SM4 Block Cipher Algorithm $50.00 immediately valid
GM/T 0003.1-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 1: General $170.00 immediately valid
GM/T 0003.2-2012 Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 2: Digital Signature Algorithm $140.00 immediately valid
GM/T 0003.3-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 3: Key Exchange Protocol $140.00 immediately valid
GM/T 0003.4-2012 Public Key Cryptographic Algorithm SM2 Based on Elliptic Curves - Part 4: Public Key Encryption Algorithm $140.00 immediately valid
GM/T 0003.5-2012 Public Key Cryptographic Algorithm SM2 Baded on Elliptic Curves - Part 5: Parameter Definition $140.00 immediately valid
GM/T 0004-2012 SM3 Password Hashing Algorithm $140.00 via email in 1~3 business day valid
GM/T 0005-2012 Randomness Test Specification $110.00 immediately superseded
GM/T 0006-2012 Cryptographic application identifier criterion specification $140.00 via email in 1~5 business day superseded
GM/T 0008-2012 Cryptography test criteria for security IC $140.00 immediately valid
GM/T 0009-2012 SM2 Cryptography Algorithm Application Specification $80.00 immediately superseded
GM/T 0010-2012 SM2 cryptography message syntax specification $130.00 immediately superseded
GM/T 0011-2012 Trusted computing--Functionality and interface specification of cryptographic support platform $680.00 immediately superseded
GM/T 0012-2012 Trusted computing--Interface specification of trusted cryptography module $680.00 via email in 1~10 business day superseded
GM/T 0012-2020 Trusted computing—Trusted computing interface specification of trusted cryptography module $1815.00 via email in 1~10 business day valid
* Related standard quantity: * Page quantity: * Current: * First Previous [84][85][86][87][88][89][90][91][92][93][94] Next End



About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: TransForyou Co., Ltd. 2008-2040