1 Scope
2 Normative references
3 Terms, definitions, symbols and
abbreviated terms
4 Conformance
5 Introducing the SPECK cryptographic
suite
6 Parameter and variable definitions
7 Crypto suite state diagram
8 Initialization and resetting
9 Authentication
10 Communication
11 Key table and key update
Annex A (normative) - Crypto Suite State Transition Table
Annex B (normative) - Errors and Error Handling
Annex C (normative) - Description of SPECK and SILC v3
Annex D (informative) - Test Vectors
Annex E (normative) - Protocol Specific Information