Tech-invite   3GPPspecs   Glossaries   IETFRFCs   Groups   SIP   ABNFs   Ti+   Search in Tech-invite

Top   in Index   Prev   None

TR 35.936 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 6: Security assessment

3GPP‑Page   ETSI‑search   full‑ToC    
use "3GPP‑Page" to get the Word version
use "ETSI‑search" to get the PDF version
for a better overview, the Table of Contents (ToC) is reproduced
V15.0.0 (PDF)  2018/06  8 p.
V14.0.0  2017/03  8 p.
V13.0.0  2016/01  8 p.
V12.1.0  2015/06  8 p.


Rapporteur:  Mr. Barry, Aguibou
See also:

The present document provides a reference to an independent performance evaluation report of the Tuak algorithm set carried out by the ISG Smart Card Centre of the Royal Holloway University of London.

 

Here   Top