Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and operational terms
5 General models for stream ciphers
6 Dedicated keystream generators
Annex A (normative) - Object Identifiers
Annex B (informative) - Test vectors
Annex C (informative) - Guidance on implementation and use
Annex D (informative) - Feature Table
Annex E (informative) - Computation over a finite field
Bibliography