1
Scope
2 Informative reference
3 Definitions
4 Abbreviations
5 Security requirements
6 Modes of operation
7 Mode 0
8 BISS Mode 1 – Functional
requirements
8.1 Overview
8.2 CA_descriptor
9 BISS Mode E – Functional
requirements
9.1 Clear Session Word
9.2 Encrypted Session Word
9.3 Decryption scheme
9.3.1 Overview
9.3.2 Unit identifiers
9.3.3 Decryption function
9.3.4 Post-processing function