Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Abbreviations and notation
5 Interindustry commands for cryptographic operations
5.1 GENERATE ASYMMETRIC KEY PAIR command
5.2 PERFORM SECURITY OPERATION command
5.3 COMPUTE CRYPTOGRAPHIC CHECKSUM operation
5.4 COMPUTE DIGITAL SIGNATURE operation
5.5 HASH operation
5.6 VERIFY CRYPTOGRAPHIC CHECKSUM operation
5.7 VERIFY DIGITAL SIGNATURE operation
5.8 VERIFY CERTIFICATE operation
5.9 ENCIPHER operation
5.10 DECIPHER operation
Annex A (informative) - Examples of operations related
to digital signature
Annex B (informative) - Examples of certificates interpreted
by the card
Annex C (informative) - Examples of asymmetric key import/export
Bibliography