Language:
    • Available Formats
    •  
    • Availability
    • Priced From ( in USD )
    • PDF
    • Immediate download
    • $27.25
      Members pay $20.44
    • Add to Cart
    • Printed Edition
    • Ships in 1-2 business days
    • $27.25
      Members pay $20.44
    • Add to Cart

Customers Who Bought This Also Bought

 

About This Item

 

Full Description

ETSI TR 135 936 provides a reference to an independent security assessment of the Tuak algorithm set carried out by the University of Waterloo, Canada.
 

Document History

  1. ETSI TR 135 936


    Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment (3GPP TR 35.936 version 16.0.0 Release 16)

    • Most Recent
  2. ETSI TR 135 936


    Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment (3GPP TR 35.936 version 15.0.0 Release 15)

    • Historical Version
  3. ETSI TR 135 936

    👀 currently
    viewing


    Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 6: Security assessment (3GPP TR 35.936 version 14.0.0 Release 14)

    • Historical Version
  4. ETSI TR 135 936


    Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment (3GPP TR 35.936 version 13.0.0 Release 13)

    • Historical Version
  5. ETSI TR 135 936


    Universal Mobile Telecommunications System (UMTS); LTE; Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 6: Security assessment (3GPP TR 35.936 version 12.1.0 Release 12)

    • Historical Version