Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TS 35.232
Word version: 18.0.0
0…
2…
2
References
3
Definitions
4
Preliminary information
5
KECCAK test data
6
Authentication algorithms f1 and f1*
7
Algorithms f2, f3, f4, f5 and f5*
$
Change History
2
References
p. 5
3
Definitions
p. 5
3.1
Definitions
p. 5
3.2
Symbols
p. 6
4
Preliminary information
p. 6
4.1
Introduction
p. 6
4.2
Radix
p. 6
4.3
Bit/Byte ordering for Tuak inputs and outputs
p. 6
4.4
Tuak inputs and outputs
p. 7
5
KECCAK test data
p. 9
5.1
Overview
p. 9
5.2
Format
p. 9
5.3
Test set 1
p. 9
5.4
Test set 2
p. 10
5.5
Test set 3
p. 10
5.6
Test set 4
p. 11
5.7
Test set 5
p. 11
5.8
Test set 6
p. 12
6
Authentication algorithms f1 and f1*
p. 13
6.1
Overview
p. 13
6.2
Format
p. 13
6.3
Test set 1
p. 13
6.4
Test set 2
p. 15
6.5
Test set 3
p. 17
6.6
Test set 4
p. 17
6.7
Test set 5
p. 20
6.8
Test set 6
p. 22
7
Algorithms f2, f3, f4, f5 and f5*
p. 24
7.1
Overview
p. 24
7.2
Format
p. 24
7.3
Test set 1
p. 25
7.4
Test set 2
p. 27
7.5
Test set 3
p. 27
7.6
Test set 4
p. 29
7.7
Test set 5
p. 29
7.8
Test set 6
p. 30
$
Change History
p. 32