Catalog of standards
Catalog of standards
35
INFORMATION TECHNOLOGY. OFFICE MACHINES
35.040
Character sets and information coding
| Reference number of the normative document | Title of the normative document | Status | Developer of the normative document and its address | Price in Armenian drams (AMD) (including VAT) |
Cart |
| ԳՕՍՏ ԻՍՕ/ ԻԷԿ 22603-2-2024 | Information technology. Digital representation of product information. Part 2. Requirements for electronic devices with integral display | Active |
|
1200 |
Russian |
| GOST ISO/IEC 15426-2-2025 | Information technology. Automatic identification and data capture techniques. Bar code verifier conformance specification. Part 2. Verifier of two-dimensional symbols | Active |
|
6800 |
Russian |
| GOST 27464-87 | Information processing systems. 7-Bit ano 8-bit codes represented on punched cards | Active |
|
2800 |
Russian |
| AST 34.001-2006 | Information technologies. Character sets and keyboards. Character encoding and keyboard layouts | Active |
- |
5200 |
Armenian |
| GOST 34.10-2012 | Информационная технология. Криптографическая защита информации. Процессы формирования и проверки электронной цифровой подписи | Active |
|
6400 |
Russian |
| GOST 34.12-2018 | Information technology. Cryptographic data security. Block ciphers | Active |
|
4400 |
Russian |
| GOST 34.13-2018 | Information technology. Cryptographic data security. Modes of operation for block ciphers | Active |
|
14800 |
Russian |
| GOST 34.310-95 | Information technology. Cryptographic. Data security. Produce and ctheck procedures of Electronic digital Signature based on Asymmetric Cryptographic algorithm | Active |
- - |
2800 |
Russian |
| GOST 34.311-95 | Information technology. Cryptographic data security. Нashing function | Active |
State Standard of Russia - |
4000 |
Russian |
| AST 171-98 | Codes and coding of information. Bar coding. Basic principles | Active |
EACS - |
2800 |
Armenian |
| AST 172-98 | Codes and coding of information. Bar coding. Terms and definitions | Active |
EACS - |
10000 |
Armenian |
| AST ISO/IEC 9796-2-2009 | Information technology. Security techniques. Digital signature schemes giving message recovery. Part 2: Integer factorization based mechanisms | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
44500 |
English |
| AST ISO/IEC 9796-3-2009 | Information technology. Security techniques. Digital signature schemes giving message recovery. Part 3: Discrete logarithm based mechanisms | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
44500 |
English |
| AST ISO/IEC 10118-1-2009 | Information technology. Security techniques. Hash-functions. Part 1: General | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
14500 |
English |
| AST ISO/IEC 10118-2-2009 | Information technology. Security techniques. Hash-functions. Part 2: Hash-functions using an n-bit block cipher | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
34500 |
English |
| AST ISO/IEC 10118-3-2009 | Information technology. Security techniques. Hash-functions. Part 3: Dedicated hash-functions | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
49500 |
English |
| AST ISO/IEC 10118-4-2009 | Information technology. Security techniques. Hash-functions . Part 4: Hash-functions using modular arithmetic | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
29500 |
English |
| AST ISO/IEC 14888-1-2008 | Information technology. Security techniques. Digital signatures with appendix. Part 1. General | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
14500 |
English |
| AST ISO/IEC 14888-2-2008 | Information technology. Security techniques. Digital signatures with appendix. Part 2: Integer factorization based mechanisms | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
44500 |
English |
| AST ISO/IEC 14888-3-2008 | Information technology. Security techniques. Digital signatures with appendix. Part 3. Discrete logarithm based mechanisms | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
44500 |
English |
| AST ISO/IEC 15408-1-2008 | Information technology. Security techniques. Evaluation criteria for IT security. Part 1. Introduction and general model | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
44500 |
English |
| GOST ISO/IEC 15417-2013 | Information technology. Automatic identification and data capture techniques. Code 128 bar code symbology specification | Active |
|
10400 |
Russian |
| GOST ISO/IEC 15420-2001 | Automatic identification. Bar coding. Symbology specification EAN/UPC | Active |
- - |
12000 |
Russian |
| GOST ISO/IEC 15426-1-2021 | Information technology. Automatic identification and data capture techniques. Bar code verifier conformance specification. Part 1. Verifier of linear symbols | Active |
|
3600 |
Russian |
| GOST ISO/IEC 15459-2-2016 | Information technologies. Automatic identification and data capture techniques. Unique identification. Part 2. Registration procedures | Active |
|
2400 |
Russian |
| GOST ISO/IEC 15459-1-2016 | Information technologies. Automatic identification and data capture techniques. Unique identification. Part 1. Individual transport units | Active |
|
4000 |
Russian |
| GOST ISO/IEC 16390-2017 | Настоящий межгосударственный стандарт устанавливает требования, предъявляемые к символи- ке штрихового кода Interleaved 2 of 5, показатели символики Interleaved 2 of 5, кодирование знаков дан- ных, размеры, допуски, алгоритмы декодирования, а также задаваемые параметры для применения. | Active |
|
5200 |
Russian |
| GOST ISO/IEC 22603-1-2024 | Information technology. Digital representation of product information. Part 1. General requirements | Active |
|
1600 |
Russian |
| AST ISO/IEC 27002-2008 | Information technologies. Security techniques. Code of practice for information security management | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
44500 |
Armenian |
| AST ISO/IEC 27003-2012 | Information technology – Security techniques - Information security management system implementation guidance | Active |
National Institute of Standards CJSV (Yerevan) 2004 c. Yrevan, Komitas str. 49/4 |
39500 |
Armenian |