Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and notation
5 Requirements
6 Model for MAC algorithms
7 MAC algorithms
Annex A (normative) - Object identifiers
Annex B (informative) - Examples
Annex C (informative) - A security analysis of the MAC
algorithms
Annex D (informative) - A comparison with previous MAC
algorithm standards
Bibliography