1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Symbols and abbreviated terms
6 Introduction of the ECC-DH crypto suite
7 Parameter definitions
8 Crypto suite state diagram
9 Initialization and resetting
10 Tag Authentication
11 Certificate memory
12 Tag Authentication procedure
13 Communication
14 Key table and key update
Annex A (normative) - Cryptographic suite State
transition table
Annex B (normative) - Error conditions and error
handling
Annex C (normative) - Cipher description
Annex D (informative) - Examples ECC cryptographic
protocol
Annex E (normative) - Air Interface Protocol specific
information
Annex F (normative) - Reconstruction of X.509 Certificate
Bibliography