The present document has been prepared by the 3GPP Task Force, and contains an example set of algorithms which
may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*. (It is not mandatory that
the particular algorithms specified in the present document are used - all seven functions are operator-specifiable rather
than being fully standardised).