2 References
35.2313GPPDocument 1: Algorithm specificationRelease 17Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*TS
The following documents contain provisions which, through reference in this text, constitute provisions of the present document.
– References are either specific (identified by date of publication, edition number, version number, etc.) or non‑specific.
– For a specific reference, subsequent revisions do not apply.
– For a non-specific reference, the latest version applies. In the case of a reference to a 3GPP document (including a GSM document), a non-specific reference implicitly refers to the latest version of that document in the same Release as the present document.
[1] 3GPP TS 33.102: "3G Security; Security Architecture3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification.[3] "The KECCAK Reference", version 3.0, 14 January 2011, G. Bertoni, J. Daemen, M. Peeters, G. van Aasche, (available at http://keccak.noekeon.org/Keccak-reference-3.0.pdf).
[4] "KECCAK Implementation Overview", version 3.2, 29 May 2012, G. Bertoni, J. Daemen, M. Peeters, G. van Aasche, R. van Keer (available at http://keccak.noekeon.org/Keccak-implementation-3.2.pdf).
[5] "SAKURA: a flexible coding for tree hashing", 3 June 2013, G. Bertoni, J. Daemen, M. Peeters, G. van Aasche, (available at http://keccak.noekeon.org/Sakura.pdf).
[6] "Securing the AES finalists against Power Analysis Attacks", in FSE 2000, Seventh Fast Software Encryption Workshop, Thomas S. Messerges, ed. Schneier, Springer Verlag, 2000.
[7] "Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems", P. C. Kocher, in CRYPTO’96, Lecture Notes in Computer Science #1109, Springer Verlag, 1996.
[8] "Side Channel Cryptanalysis of Product Ciphers", in ESORICS’98, Lecture Notes in Computer Science #1485, Springer Verlag, 1998, J. Kelsey, B. Schneier, D. Wagner, C. Hall.
[9] "DES and differential power analysis", in CHES’99, Lecture Notes in Computer Science #1717, Springer Verlag, 1999, L. Goubin, J. Patarin.
[10] "Differential Power Analysis", in CRYPTO’99, Lecture Notes in Computer Science #1666, Springer Verlag, 1999, P. Kocher, J. Jaffe, B. Jun.
[11] "On Boolean and Arithmetic Masking against Differential Power Analysis", in CHES’00, Lecture Notes in Computer Science series, Springer Verlag, 2000, L. Goubin, J.-S. Coron.
[12] 3GPP TS 33.401: "3GPP System Architecture Evolution (SAE); Security architecture".
[13] Void
[14] 3GPP TR 21.905: "Vocabulary for 3GPP specifications".
[15] 3GPP TS 35.232: "3G Security; Specification of the Tuak Algorithm Set: a Second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data".
[16] 3GPP TS 35.233: "3G Security; Specification of the Tuak Algorithm Set: a second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data".