TR 35.936
Specification of the TUAK Algorithm Set:
a second example Algorithm Set for the 3GPP
Authentication and Key Generation
Functions f1, f1*, f2, f3, f4, f5 and f5*
Document 6: Security Assessment
The present document provides a reference to an independent security assessment of the Tuak algorithm set carried out by the University of Waterloo, Canada.
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
References are either specific (identified by date of publication, edition number, version number, etc.) or non-specific.
For a specific reference, subsequent revisions do not apply.
For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
TS 35.231: "Specification of the Tuak algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification ".
For the purposes of the present document, the terms and definitions given in TS 35.231 apply. A term defined in the present document takes precedence over the definition of the same term, if any, in TS 35.231.