Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 MAC Algorithm 1
7 MAC Algorithm 2
8 MAC Algorithm 3
Annex A (normative) - ASN.1 Module
Annex B (informative) - Examples
Annex C (informative) - A security analysis of the MAC
algorithms
Bibliography