Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Data dictionary
6 Authentication Protocol Description
7 Application identification
8 Command set
9 Status bytes and error handling
10 Key diversification
11 Session key generation
12 Default mode
Annex A (normative) - Test vectors
Annex B (informative) - Key management policy
Annex C (informative) - Keyset management
Annex D (informative) - Reference implementation
Annex E (informative) - Identity leakage considerations
Annex F (informative) - Operational mode management
Annex G (informative) - PLAID security features
Bibliography