Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 35.207
Word version: 18.0.0
0…
2…
2
Introductory information
3
Rijndael test data
4
Authentication algorithms f1 AND f1*
5
Algorithms f2, f5 and f3
6
Algorithms f4 and f5*
$
Change History
2
Introductory information
p. 6
2.1
Introduction
p. 6
2.2
Radix
p. 6
2.3
Bit/Byte ordering
p. 6
2.4
List of Variables
p. 6
2.5
Algorithm Inputs and Outputs
p. 7
2.6
Coverage
p. 8
3
Rijndael test data
p. 8
3.1
Overview
p. 8
3.2
Format
p. 8
3.3
Test Set 1
p. 9
3.4
Test Set 2
p. 10
3.5
Test Set 3
p. 10
3.6
Test Set 4
p. 11
3.7
Test Set 5
p. 11
3.8
Test Set 6
p. 12
4
Authentication algorithms f1 AND f1*
p. 12
4.1
Overview
p. 12
4.2
Format
p. 12
4.3
Test Set 1
p. 12
4.4
Test Set 2
p. 13
4.5
Test Set 3
p. 13
4.6
Test Set 4
p. 13
4.7
Test Set 5
p. 13
4.8
Test Set 6
p. 14
5
Algorithms f2, f5 and f3
p. 14
5.1
Overview
p. 14
5.2
Format
p. 14
5.3
Test Set 1
p. 15
5.4
Test Set 2
p. 15
5.5
Test Set 3
p. 15
5.6
Test Set 4
p. 15
5.7
Test Set 5
p. 15
5.8
Test Set 6
p. 16
6
Algorithms f4 and f5*
p. 16
6.1
Overview
p. 16
6.2
Format
p. 16
6.3
Test Set 1
p. 16
6.4
Test Set 2
p. 17
6.5
Test Set 3
p. 17
6.6
Test Set 4
p. 17
6.7
Test Set 5
p. 17
6.8
Test Set 6
p. 17
$
Change History
p. 19