EMVCo, May 2007 -
Part I - GeneralPart II - Security and Key Management TechniquesStatic Data Authentication (SDA)
Offline Dynamic Data Authentication
Personal Identification Number Encipherment
Application Cryptogram and Issuer Authentication
Secure Messaging
Certification Authority Public Key Management Principles and Policies
Terminal Security and Key Management Requirements
Part III - AnnexesAnnex A Security Mechanisms
Annex B Approved Cryptographic Algorithms
Annex C Informative References
Annex D Implementation Considerations