35.10U | TS | UMTS Terminal aspects; Man Machine Interface (MMI) | Withdrawn before change control |
SP
|
|
35.201 | TS | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification | Under change control |
S3
|
|
35.202 | TS | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification | Under change control |
S3
|
|
35.203 | TS | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data | Under change control |
S3
|
|
35.204 | TS | 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data | Under change control |
S3
|
|
35.205 | TS | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General | Under change control |
S3
|
|
35.206 | TS | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification | Under change control |
S3
|
|
35.207 | TS | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data | Under change control |
S3
|
|
35.208 | TS | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data | Under change control |
S3
|
|
35.209 | TS | 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation | Withdrawn under change control |
S3
|
|
35.215 | TS | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications | Under change control |
S3
|
|
35.216 | TS | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification | Under change control |
S3
|
|
35.217 | TS | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data | Under change control |
S3
|
|
35.218 | TS | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data | Under change control |
S3
|
|
35.221 | TS | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications | Under change control |
S3
|
|
35.222 | TS | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification | Under change control |
S3
|
|
35.223 | TS | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data | Under change control |
S3
|
|
35.231 | TS | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification | Under change control |
S3
|
|
35.232 | TS | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data | Under change control |
S3
|
|
35.233 | TS | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data | Under change control |
S3
|
|
35.909 | TR | 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation | Under change control |
S3
|
|
35.919 | TR | Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report | Under change control |
S3
|
|
35.924 | TR | Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report | Under change control |
S3
|
|
35.934 | TR | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation | Under change control |
S3
|
|
35.935 | TR | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation | Under change control |
S3
|
|
35.936 | TR | Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment | Under change control |
S3
|
|