ETSI TR 135 934 (together with three accompanying documents, [8], [9] and [10] describes the design rationale,and presents evaluation results, on the Tuak algorithm set [5] – a second example set of algorithms which may be usedas the authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*, e.g. as an alternative to MILENAGE.
- Edition:
- 12.0.0
- Published:
- 01/01/2015
- Number of Pages:
- 21
- File Size:
- 1 file , 200 KB
- Note:
- This product is unavailable in Russia, Ukraine, Belarus
Reviews
There are no reviews yet.