Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviated terms
5 Overall requirements
6 Mechanisms using a short check-value
7 Mechanisms using a manual transfer of a short digest-value
or a short key
8 Mechanisms using a MAC
Annex A (normative) - ASN.1 modules
Annex B (informative) - Using manual authentication protocols
for the exchange of secret keys
Annex C (informative) - Using manual authentication protocols
for the exchange of public keys
Annex D (informative) - On mechanism security and choices
for parameter lengths
Annex E (informative) - A method for generating short
check-values
Annex F (informative) - Comparative analysis in security and
efficiency of mechanisms 1-8
Annex G (informative) - Methods for generating short
digest-values
Bibliography