Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x

Content for  TR 35.934  Word version:  17.0.0

Top   Top   None   None   Next
1…   2…
1 Scope
...

 

1  Scopep. 6

The present document (together with three accompanying documents, [8], [9] and [10] describes the design rationale, and presents evaluation results, on the Tuak algorithm set [5] - a second example set of algorithms which may be used as the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.

Up   Top   ToC