Foreword
Introduction
1 Scope
2 Conformance
3 Normative references
4 Terms and definitions
5 Symbols and abbreviated terms
6 Crypto suite introduction
7 Parameter definitions
8 State diagrams
9 Initialization and resetting
10 Identification and authentication
11 Secure communication
Annex A (normative) - State transition tables
Annex B (normative) - Error codes and error handling
Annex C (normative) - Cipher description
Annex D (informative) - Test Vectors
Annex E (normative) - Protocol specific
Annex F (informative) - Non-traceable and
integrity-protected Tag identification
Annex G (informative) - Memory Organization
for Secure UHF Tags (Proposal)
Bibliography