Foreword
Introduction
1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Symbols and abbreviated terms
6 Crypto suite introduction
7 Parameter definitions
8 Initialization and resetting
9 State diagrams
10 Identification and Authentication
11 Secure communication
Annex A (normative) - State transition tables
Annex B (normative) - Error codes and error handling
Annex C (normative) - Cipher description
Annex D (informative) - Test Vectors
Annex E (normative) - Protocol specific
Annex F (informative) - Non-traceable and integrity-protected
Tag identification
Annex G (informative) - Memory Organisation for Secure
UHF Tags (Proposal)
Annex H (informative) - Bibliography