Tech-invite3GPPspecsGlossariesIETFRFCsGroupsSIPABNFsWorld Map
Top   in Index   Prev   None

TR 35.936 (SA3)
TUAK algorithm set: a 2nd example for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5* –
Document 6: Security assessment

ToC   3GPP‑Page   ETSI‑search   Help    
V14.0.0 (PDF)  2017/03  8 p.
V13.0.0  2016/01  8 p.
V12.1.0  2015/06  8 p.


Rapporteur:  Mr. Barry, Aguibou
See also:  Tuak-related TS/TR

The present document provides a reference to an independent performance evaluation report of the Tuak algorithm set carried out by the ISG Smart Card Centre of the Royal Holloway University of London.


 

Here   Top