GOST 34.311-1995 Information technology. Cryptographic Data Security. Cashing function
GOST R 34.10-2001 Information technology. Cryptographic data security. Formation and verification processes of [electronic] digital signature
GOST R 34.11-1994 Information technology. Cryptographic data security. Hashing function
GOST R 50779.10-2000 Statistical methods. Probability and general statistical terms. Terms and definitions
GOST R 50779.21-2004 Statistical methods. Determination rules and methods for calculation of statistical characteristics based on sample data. Part 1. Normal distribution
GOST R ISO/IEC 15408-1-2002 Information technology. Security techniques. Evaluation criteria for IT security. Part 1. Introduction and general model
GOST R ISO/IEC 15408-2-2002 Information technology. Security techniques. Evaluation criteria for IT security. Part 2. Security functional requirements
GOST R ISO/IEC 15408-3-2002 Information technology. Security techniques. Evaluation criteria for IT security. Part 3. Security assurance requirements
GOST R 52633.0-2006 history
2006GOST R 52633.0-2006 Information protection. Information protection technology. Requirements to the means of high-reliability biometric authentication