Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Unilateral authentication mechanism based
on discrete logarithms on elliptic curves
6 Unilateral authenticated key exchange
mechanism based on encryption
7 Identity-based signature mechanism
Annex A (normative) - Object identifiers
Annex B (normative) - Memory-Computation Trade-Off
Technique
Annex C (informative) - Numerical examples
Annex D (informative) - Features
Bibliography