EMCCom, May 2007. — 106 p.
Part I - GeneralScope
Normative References
Definitions
Abbreviations, Notations, Conventions, and Terminology
Part II - Security and Key Management TechniquesStatic Data Authentication (SDA)
Offline Dynamic Data Authentication
Personal Identification Number Encipherment
Application Cryptogram and Issuer Authentication
Secure Messaging
Certification Authority Public Key Management Principles and Policies
Terminal Security and Key Management Requirements
Part III - AnnexesAnnex A Security Mechanisms
Annex B Approved Cryptographic Algorithms
Annex C Informative References
Annex D Implementation Considerations
Part IV - Common Core Definitions