Content for TR 35.934 Word version: 16.0.0
1 Scope Word‑p. 6
The present document (together with three accompanying documents, ,  and  describes the design rationale, and presents evaluation results, on the Tuak algorithm set  - a second example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.