The 5G Standard

3GPP Specifications per TSG/WG


3GPP Specifications for group: S3 (showing rapporteur)

Click on spec number for details

TR 01.31 Fraud Information Gathering System (FIGS); Service requirements; Stage 0 Mr. Sahlin, Bengt
TR 01.33 Lawful Interception requirements for GSM Mr. Spalt, Bernhard
TS 01.61 General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements Prof. Walker, Michael
TS 02.09 Security aspects Mr. Christoffersson, Per
TS 02.31 Fraud Information Gathering System (FIGS); Service description; Stage 1 Mr. Sahlin, Bengt
TS 02.32 Immediate Service Termination (IST); Service description; Stage 1 Mr. Sahlin, Bengt
TS 02.33 Lawful Interception (LI); Stage 1 Mr. Spalt, Bernhard
TS 03.20 Security-related network functions Mr. Nguyen Ngoc, Sebastien
TS 03.20ext Security-related fetwork functions (Ext) Mr. Nguyen Ngoc, Sebastien
TS 03.31 Fraud Information Gathering System (FIGS); Service description; Stage 2 Mr. Sahlin, Bengt
TS 03.33 3G Security; Lawful Interception; Stage 2 Mr. Spalt, Bernhard
TS 03.35 Immediate Service Termination (IST); Stage 2 Mr. Sahlin, Bengt
TR 10.20 Lawful Interception requirements for GSM Mr. Mckibben, Bernie
TS 21.133 3G security; Security threats and requirements Mr. Christoffersson, Per
TS 22.031 3G Security; Fraud Information Gathering System (FIGS); Service description; Stage 1 Mr. Bleckert, Peter
TS 22.032 Immediate Service Termination (IST); Service description; Stage 1 Mr. Bleckert, Peter
TS 23.031 3G Security; Fraud Information Gathering System (FIGS); Technical realization; Stage 2 Mr. Sahlin, Bengt
TS 23.035 Immediate Service Termination (IST); Stage 2 Mr. Sahlin, Bengt
TS 33.102 3G security; Security architecture Miss Jerichow, Anja
TS 33.103 3G security; Integration guidelines Mr. Blanchard, Colin
TS 33.105 3G Security; Cryptographic algorithm requirements Mr. Chikazawa, Takeshi
TS 33.106 3G security; Lawful interception requirements Mr. Jaspers, Koen
TS 33.107 3G security; Lawful interception architecture and functions Mr. Jaspers, Koen
TS 33.108 3G security; Handover interface for Lawful Interception (LI) Mr. Rao, Nagaraja
TS 33.110 Key establishment between a Universal Integrated Circuit Card (UICC) and a terminal Mrs. Pauliac, Mireille
TS 33.116 Security Assurance Specification (SCAS) for the MME network product class Dr. Zugenmaier, Alf
TS 33.117 Catalogue of general security assurance requirements Dr. Zugenmaier, Alf
TS 33.120 Security Objectives and Principles Mr. Sahlin, Bengt
TS 33.122 Security aspects of Common API Framework (CAPIF) for 3GPP northbound APIs Mr. Rajadurai, Rajavelsamy
TS 33.126 Lawful Interception requirements Mr. Jaspers, Koen
TS 33.127 Lawful Interception (LI) architecture and functions Mr. Jaspers, Koen
TS 33.128 Security; Protocol and procedures for Lawful Interception (LI); Stage 3 Mr. Rao, Nagaraja
TS 33.141 Presence service; Security Mr. Mattsson, John
TS 33.163 Battery Efficient Security for very low throughput Machine Type Communication (MTC) devices (BEST) Mr. Evans, Tim P.
TS 33.179 Security of Mission Critical Push To Talk (MCPTT) over LTE Mr. Haigh, Peter
TS 33.180 Security of the Mission Critical (MC) service Mr. Woodward, Tim
TS 33.185 Security aspect for LTE support of Vehicle-to-Everything (V2X) services Mr. Wong, Marcus
TS 33.187 Security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements Mr. Rajadurai, Rajavelsamy
TS 33.200 3G Security; Network Domain Security (NDS); Mobile Application Part (MAP) application layer security Dr. Escott, Adrian
TS 33.203 3G security; Access security for IP-based services Dr. Ben Henda, Noamen
TS 33.204 3G Security; Network Domain Security (NDS); Transaction Capabilities Application Part (TCAP) user security Miss Jerichow, Anja
TS 33.210 Network Domain Security (NDS); IP network layer security Mr. Kohalmi, Steve
TS 33.216 Security Assurance Specification (SCAS) for the evolved Node B (eNB) network product class Mr. Wong, Marcus
TS 33.220 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Miss Jerichow, Anja
TS 33.221 Generic Authentication Architecture (GAA); Support for subscriber certificates Miss Jerichow, Anja
TS 33.222 Generic Authentication Architecture (GAA); Access to network application functions using Hypertext Transfer Protocol over Transport Layer Security (HTTPS) Mr. Lehtovirta, Vesa
TS 33.223 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push function Miss Jerichow, Anja
TS 33.224 Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) push layer Dr. Blom, Rolf
TS 33.226 Security assurance for IP Multimedia Subsystem (IMS) Dr. Zhang, Bo
TS 33.234 3G security; Wireless Local Area Network (WLAN) interworking security Mr. Lehtovirta, Vesa
TS 33.246 3G Security; Security of Multimedia Broadcast/Multicast Service (MBMS) Dr. Escott, Adrian
TS 33.250 Security assurance specification for the PGW network product class Mr. Peng, Jin
TS 33.256 Security aspects of Uncrewed Aerial Systems (UAS) Dr. Escott, Adrian
TS 33.259 Key establishment between a UICC hosting device and a remote device Mr. Lehtovirta, Vesa
TS 33.303 Proximity-based Services (ProSe); Security aspects Dr. Escott, Adrian
TS 33.310 Network Domain Security (NDS); Authentication Framework (AF) Miss Jerichow, Anja
TS 33.320 Security of Home Node B (HNB) / Home evolved Node B (HeNB) Mr. Wong, Marcus
TS 33.326 Security Assurance Specification (SCAS) for the Network Slice-Specific Authentication and Authorization Function (NSSAAF) network product class Mrs. Rong, Wu
TS 33.328 IP Multimedia Subsystem (IMS) media plane security Mr. Evans, Tim P.
TS 33.401 3GPP System Architecture Evolution (SAE); Security architecture Dr. Prasad, Anand
TS 33.402 3GPP System Architecture Evolution (SAE); Security aspects of non-3GPP accesses Miss Jerichow, Anja
TS 33.434 Security aspects of Service Enabler Architecture Layer (SEAL) for verticals Mr. Rajadurai, Rajavelsamy
TS 33.501 Security architecture and procedures for 5G System Dr. Zugenmaier, Alf
TS 33.503 Security Aspects of Proximity based Services (ProSe) in the 5G System (5GS) Mr. Zhou, Wei
TS 33.511 Security Assurance Specification (SCAS) for the next generation Node B (gNodeB) network product class Mr. Wong, Marcus
TS 33.512 5G Security Assurance Specification (SCAS); Access and Mobility management Function (AMF) Ms. Deng, Juan
TS 33.513 5G Security Assurance Specification (SCAS); User Plane Function (UPF) Mr. Rajadurai, Rajavelsamy
TS 33.514 5G Security Assurance Specification (SCAS) for the Unified Data Management (UDM) network product class Dr. Yoshizawa, Taka
TS 33.515 5G Security Assurance Specification (SCAS) for the Session Management Function (SMF) network product class Mr. Wong, Marcus
TS 33.516 5G Security Assurance Specification (SCAS) for the Authentication Server Function (AUSF) network product class Dr. Jost, Christine
TS 33.517 5G Security Assurance Specification (SCAS) for the Security Edge Protection Proxy (SEPP) network product class Mr. Peinado, German
TS 33.518 5G Security Assurance Specification (SCAS) for the Network Repository Function (NRF) network product class Mr. Orkopoulos, Stawros
TS 33.519 5G Security Assurance Specification (SCAS) for the Network Exposure Function (NEF) network product class Mr. PENG, Jin
TS 33.520 Security Assurance Specification (SCAS) for Non-3GPP InterWorking Function (N3IWF) Dr. Gao, Feng
TS 33.521 5G Security Assurance Specification (SCAS);Network Data Analytics Function (NWDAF) Mr. Qi, Minpeng
TS 33.522 5G Security Assurance Specification (SCAS); Service Communication Proxy (SCP) Miss Jerichow, Anja
TS 33.523 5G Security Assurance Specification (SCAS); Split gNB product classes Dr. Escott, Adrian
TS 33.526 Security assurance specification for the Management Function (MnF) Dr. Ben Henda, Noamen
TS 33.527 Security Assurance Specification (SCAS) for 3GPP virtualized network products Mr. Qi, Minpeng
TS 33.528 Security Assurance Specification (SCAS) for Policy Control Function (PCF) Mr. Andreas, Joerg
TS 33.529 Security Assurance Specification (SCAS) for Short Message Service Function (SMSF) Prof. Hanawal, Manjesh Kumar
TS 33.530 Security Assurance Specification (SCAS) for Unified Data Repository (UDR) Mr. Andreas, Joerg
TS 33.533 Security aspects of ranging based services and sidelink positioning Ms. Lu, Wei
TS 33.535 Authentication and Key Management for Applications (AKMA) based on 3GPP credentials in the 5G System (5GS) Miss Huang, Xiaoting
TS 33.536 Security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services Mr. Kim, Dongjoo
TS 33.537 Security Assurance Specification (SCAS) for the Authentication and Key Management for Applications (AKMA) Anchor Function (AAnF) Miss Huang, Xiaoting
TS 33.558 Security aspects of enhancement of support for enabling edge applications Dr. Zhang, Bo
TR 33.700-28 Study on security aspects of satellite access Ms. Lu, Wei
TR 33.700-29 Study on Security and Privacy Aspects of 5G Satellite Access Phase 3 Mr. Zhou, Wei
TR 33.700-41 Study on cryptographic algorithm transition to 256 bits Dr. Nakano, Yuto
TR 33.701 Study on mitigations against bidding down Attacks Dr. Ben Henda, Noamen
TR 33.702 Security for mobility over non-3GPP access to avoid full primary authentication Mr. Khare, Saurabh
TR 33.737 Study on Authentication and Key Management for Applications (AKMA) phase 2 Miss Huang, Xiaoting
TR 33.738 Study on security aspects of enablers for network automation for the 5G system phase 3 Mr. Liu, Chang
TR 33.739 Study on security enhancement of support for edge computing phase 2 Dr. Zhang, Bo
TR 33.740 Study on security aspects of Proximity Based Services (ProSe) in 5G System (5GS) phase 2 Mr. Zhou, Wei
TR 33.741 Study on home network triggered primary authentication Mr. Li, He
TS 33.757 Study on security for PLMN hosting a NPN Ms. Shen, Jun
TR 33.769 Feasibility Study on Security Aspects of Machine-Type Communications Enhancements to facilitate communications with Packet Data Networks and Applications Mr. Rajadurai, Rajavelsamy
TR 33.776 Study of ACME for Automated Certificate Management in SBA Mr. Eckel, Charles
TR 33.790 Study on the security support for the next generation real time communication services phase 2 Dr. Tsiatsis, Vlasios
TR 33.794 Study on enablers for Zero Trust Security Dr. Baskaran, Sheeba Backia Mary
TR 33.803 Coexistence between TISPAN and 3GPP authentication schemes Miss Fouquet, Sylvie
TR 33.804 Single Sign On (SSO) application security for Common IP Multimedia Subsystem (IMS) based on Session Initiation Protocol (SIP) Digest Dr. Holtmanns, Silke
TR 33.805 Study on security assurance methodology for 3GPP network products Mr. Habermacher, Loic
TR 33.807 Study on the security of the wireless and wireline convergence for the 5G system architecture Mr. Li, He
TR 33.808 KDF negotiation for 5GS security – phase2 Dr. Muhanna, Ahmad
TR 33.809 Study on 5G security enhancements against False Base Stations (FBS) Ms. Guo, Ivy
TR 33.810 3G Security; Network Domain Security / Authentication Framework (NDS/AF); Feasibility Study to support NDS/IP evolution Mr. Sahlin, Bengt
TR 33.811 Study on security aspects of 5G network slicing management Dr. Lei, Zander (Zhongding)
TR 33.812 Feasibility study on the security aspects of remote provisioning and change of subscription for Machine to Machine (M2M) equipment Mr. Lehtovirta, Vesa
TR 33.813 Study on security aspects of network slicing enhancement Mr. Nair, Suresh
TR 33.814 Study on the security of the enhancement to the 5G Core (5GC) location services Mr. Zhou, Wei
TR 33.815 Study on security aspects of Provision of Access to Restricted Local Operator Services by Unauthenticated UEs (PARLOS) Mr. Schumacher, Greg
TR 33.816 Feasibility study on LTE relay node security Dr. Escott, Adrian
TR 33.817 Feasibility study on (Universal) Subscriber Interface Module (U)SIM security reuse by peripheral devices on local interfaces Dr. Yaqub, Raziq
TR 33.818 Security Assurance Methodology (SECAM) and Security Assurance Specification (SCAS) for 3GPP virtualized network products Mr. Qi, Minpeng
TR 33.819 Study on security enhancements of 5G System (5GS) for vertical and Local Area Network (LAN) services Miss Jerichow, Anja
TR 33.820 Security of Home Node B (HNB) / Home evolved Node B (HeNB) Mr. Yang, Yangmei
TR 33.821 Rationale and track of security decisions in Long Term Evolution (LTE) RAN / 3GPP System Architecture Evolution (SAE) Dr. Zhang, Dajiang
TR 33.822 Security aspects for inter-access mobility between non 3GPP and 3GPP access network Dr. Zhang, Dajiang
TR 33.823 Security for usage of Generic Bootstrapping Architecture (GBA) with a User Equipment (UE) browser Dr. Holtmanns, Silke
TR 33.824 Study on Security for Next Radio (NR) Integrated Access and Backhaul (IAB) Mr. Rajadurai, Rajavelsamy
TR 33.825 Study on the security of Ultra-Reliable Low-Latency Communication (URLLC) for the 5G System (5GS) Mrs. Rong, Wu
TR 33.826 Study on Lawful Interception Service Evolution Mr. Jacobson, Terry
TR 33.827 Study on providing for Lawful Interception (LI) in the S8 Home Routeing (S8HR) architecture for Voice over LTE (VoLTE) Mr. Schumacher, Greg
TR 33.828 IP Multimedia Subsystem (IMS) media plane security Mr. Howard, Peter
TR 33.829 Extended IP Multimedia Subsystem (IMS) media plane security features Mr. Howard, Peter
TR 33.830 Feasibility study on IMS firewall traversal Mr. Kumar, Prashant
TR 33.831 Study on security on spoofed call detection and prevention (Stage 2) Mr. Li, Xiangjun
TR 33.832 Study on IMS Enhanced Spoofed Call Prevention and Detection Mr. Schumacher, Greg
TR 33.833 Study on security issues to support Proximity Services (ProSe) Dr. Escott, Adrian
TR 33.834 Study on Long Term Key Update Procedures (LTKUP) Mr. Evans, Tim P.
TR 33.835 Study on authentication and key management for applications based on 3GPP credential in 5G Miss Huang, Xiaoting
TR 33.836 Study on security aspects of 3GPP support for advanced Vehicle-to-Everything (V2X) services Mr. Kim, Dongjoo
TR 33.838 Study on Protection against Unsolicited Communication for IMS (PUCI) Dr. Prasad, Anand
TR 33.839 Study on security aspects of enhancement of support for edge computing in the 5G Core (5GC) Dr. Zhang, Bo
TR 33.840 Study on security aspects of the disaggregated gNB architecture Mr. xu, sen
TR 33.841 Study on the support of 256-bit algorithms for 5G Mr. Evans, Tim P.
TR 33.842 Study on Lawful Interception (LI) service in 5G Mr. McQuaid, Gerald
TR 33.843 Study on security architecture enhancements to Proximity Services (ProSe) User Equipment (UE)-to-network relay Mr. Li, He
TR 33.844 Security Study on IP Multimedia Subsystem (IMS) based peer-to-peer content distribution services; Stage 2 Dr. Qing, Yu
TR 33.845 Study on storage and transport of 5G Core (5GC) security parameters for Authentication Credential Repository Processing Function (ARPF) authentication Mr. Evans, Tim P.
TR 33.846 Study on authentication enhancements in the 5G System (5GS) Dr. Tsiatsis, Vlasios
TR 33.847 Study on security aspects of enhancement for proximity based services in the 5G System (5GS) Mr. Zhou, Wei
TR 33.848 Study on security impacts of virtualisation Mr. Leadbeater, Alex
TR 33.849 Study on subscriber privacy impact in 3GPP Dr. Gao, Feng
TR 33.850 Study on security aspects of enhancements for 5G Multicast-Broadcast Services (MBS) Mr. Guo, Longhua
TR 33.851 Study on security for enhanced support of Industrial Internet of Things (IIoT) Miss Jerichow, Anja
TR 33.853 Study on key issues and potential solutions for integrity protection of the User Plane (UP) Mr. Evans, Tim P.
TR 33.854 Study on security aspects of Uncrewed Aerial Systems (UAS) Dr. Escott, Adrian
TR 33.855 Study on security aspects of the 5G Service Based Architecture (SBA) Dr. Jost, Christine
TR 33.856 Study on security aspects of single radio voice continuity from 5G to UTRAN Dr. Gao, Feng
TR 33.857 Study on enhanced security support for Non-Public Networks (NPN) Dr. Jost, Christine
TR 33.858 Study on security aspects of enhanced support of Non-Public Networks (NPN) phase 2 Dr. Jost, Christine
TR 33.859 Study on the Introduction of Key Hierarchy in Universal Terrestrial Radio Access Network (UTRAN) Mr. Norrman, Karl
TR 33.860 Study on Enhanced General Packet Radio Service (EGPRS) access security enhancements with relation to cellular Internet of Things (IoT) Mr. Torvinen, Vesa
TR 33.861 Study on evolution of Cellular Internet of Things (CIoT) security for the 5G System Mr. Normann, Henrik Andreas
TR 33.862 Study on security aspects of the Message Service for MIoT over the 5G System (MSGin5G) Miss Huang, Xiaoting
TR 33.863 Study on battery efficient security for very low throughput Machine Type Communication (MTC) devices Mr. Evans, Tim P.
TR 33.864 Study on the security of Access and Mobility Management Function (AMF) re-allocation Dr. Tsiatsis, Vlasios
TR 33.865 Security Aspects of WLAN Network Selection for 3GPP Terminals Ms. Xu, Lydia
TR 33.866 Study on security aspects of enablers for Network Automation (eNA) for the 5G system (5GS) Phase 2 Miss Huang, Xiaoting
TR 33.867 Study on user consent for 3GPP services Mrs. Rong, Wu
TR 33.868 Study on security aspects of Machine-Type Communications (MTC) and other mobile data applications communications enhancements Mr. Rajadurai, Rajavelsamy
TR 33.870 Study of privacy of identifiers over radio access Mr. Brusilovsky, Alec
TR 33.871 Study on security for Web Real Time Communications (WebRTC) IP Multimedia Subsystem (IMS) client access to IMS Mr. Ohlsson, Oscar
TR 33.872 Study on security enhancements to Web Real Time Communication (WebRTC) access to IP Multimedia Subsystem (IMS) Mr. Lehtovirta, Vesa
TR 33.873 Study on the security of the system enablers for devices having Multiple Universal Subscriber Identity Modules (MUSIM) Mr. Kolekar, Abhijeet
TR 33.874 Study on enhanced security for network slicing phase 2 Dr. Lei, Zander (Zhongding)
TR 33.875 Study on enhanced security aspects of the 5G Service Based Architecture (SBA) Miss Jerichow, Anja
TR 33.876 Study on automated certificate management in Service-Based Architecture (SBA) Mr. Peinado, German
TR 33.877 Study on the security aspects of Artificial Intelligence (AI)/Machine Learning (ML) for the Next Generation Radio Access Network (NG-RAN) Dr. Tsiatsis, Vlasios
TR 33.879 Study on security enhancements for Mission Critical Push To Talk (MCPTT) over LTE Mr. Haigh, Peter
TR 33.880 Study on mission critical security enhancements Mr. Haigh, Peter
TR 33.881 Study on Non-Seamless WLAN Offload (NSWO) in 5G System (5GS) using 3GPP credentials Mr. M Dhanasekaran, Ranganathan
TR 33.882 Study on personal Internet of Things (IoT) networks security aspects Mr. Xie, Zhenhua
TR 33.883 Study on security enhancements for 5G multicast-broadcast services phase 2 Mr. Guo, Longhua
TR 33.884 Study on security of application enablement aspects for subscriber-aware northbound API access Dr. Zugenmaier, Alf
TR 33.885 Study on security aspects for LTE support of Vehicle-to-Everything (V2X) services Mr. Wong, Marcus
TR 33.886 Study on enhanced security for network slicing phase 3 Dr. Lei, Zander (Zhongding)
TR 33.887 Study on security aspects for support for 5G Wireless and Wireline Convergence (5WWC) phase 2 Mr. Khare, Saurabh
TR 33.888 Study on security issues to support Group Communication System Enablers (GCSE) for LTE Mr. Merkel, Jürgen
TR 33.889 Study on security aspects of Machine-Type Communications (MTC) architecture and feature enhancements Mr. Rajadurai, Rajavelsamy
TR 33.890 Study on security support for next generation real time communication services Mr. Li, Fei
TR 33.891 Study on security of phase 2 for Uncrewed Aerial System (UAS), Uncrewed Aerial Vehicle (UAV) and Urban Air Mobility (UAM) Dr. Escott, Adrian
TR 33.892 Study on UE Route Selection Policy (URSP) rules to securely identify applications Dr. Kunz, Andreas
TR 33.893 Study on security aspects of ranging-based services and sidelink positioning Ms. Lu, Wei
TR 33.894 Study on applicability of the zero trust security principles in mobile networks Dr. Baskaran, Sheeba Backia Mary
TR 33.896 Study of security aspects on user consent for 3GPP services phase 2 Mrs. Rong, Wu
TR 33.897 Study on isolated E-UTRAN operation for public safety; Security aspects Dr. Piggin, Paul
TR 33.898 Study on security and privacy of Artificial Intelligence/Machine Learning (AI/ML)-based services and applications in 5G Mr. Wong, Marcus
TR 33.901 Criteria for cryptographic Algorithm design process Dr. Blom, Rolf
TR 33.902 Formal Analysis of the 3G Authentication Protocol Dr. Horn, Guenther
TR 33.905 Recommendations for Trusted Open Platforms Dr. Holtmanns, Silke
TR 33.908 3G Security; General report on the design, specification and evaluation of 3GPP standard confidentiality and integrity algorithms Prof. Walker, Michael
TR 33.909 3G Security; Report on the design and evaluation of the MILENAGE algorithm set; Deliverable 5: An example algorithm for the 3GPP authentication and key generation functions Prof. Walker, Michael
TR 33.916 Security Assurance Methodology (SECAM) for 3GPP network products Dr. Zugenmaier, Alf
TR 33.918 Generic Authentication Architecture (GAA); Early implementation of Hypertext Transfer Protocol over Transport Layer Security (HTTPS) connection between a Universal Integrated Circuit Card (UICC) and a Network Application Function (NAF) Mr. Seif, Jacques
TR 33.919 3G Security; Generic Authentication Architecture (GAA); System description Mrs. Van Moffaert, Annelies
TR 33.920 SIM card based Generic Bootstrapping Architecture (GBA); Early implementation feature Dr. Holtmanns, Silke
TR 33.924 Identity management and 3GPP security interworking; Identity management and Generic Authentication Architecture (GAA) interworking Dr. Holtmanns, Silke
TR 33.926 Security Assurance Specification (SCAS) threats and critical assets in 3GPP network product classes Mr. Wong, Marcus
TR 33.927 Security Assurance Specification (SCAS); threats and critical assets in 3GPP virtualized network product classes Mr. Qi, Minpeng
TR 33.928 ADMF logic for provisioning Lawful Interception (LI) Mr. Rao, Nagaraja
TR 33.929 Lawful Interception (LI) implementation guidance Mr. Rao, Nagaraja
TR 33.935 Study on detailed Long Term Key Update Process (LTKUP) detailed solutions Mr. Evans, Tim P.
TR 33.936 Security Assurance Methodology (SECAM) for 3GPP virtualized network products Mr. Qi, Minpeng
TR 33.937 Study of mechanisms for Protection against Unsolicited Communication for IMS (PUCI) Dr. Prasad, Anand
TR 33.969 Study on security aspects of Public Warning System (PWS) Mr. Mattsson, John
TR 33.978 Security aspects of early IP Multimedia Subsystem (IMS) Mr. Howard, Peter
TR 33.980 Liberty Alliance and 3GPP security interworking; Interworking of Liberty Alliance Identity Federation Framework (ID-FF), Identity Web Services Framework (ID-WSF) and Generic Authentication Architecture (GAA) Dr. Holtmanns, Silke
TS 35.201 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 1: f8 and f9 specification Mr. Evans, Tim P.
TS 35.202 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification Mr. Evans, Tim P.
TS 35.203 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 3: Implementors' test data Mr. Evans, Tim P.
TS 35.204 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 4: Design conformance test data Mr. Evans, Tim P.
TS 35.205 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General Mr. Evans, Tim P.
TS 35.206 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Algorithm specification Mr. Evans, Tim P.
TS 35.207 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Implementors' test data Mr. Evans, Tim P.
TS 35.208 3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Design conformance test data Mr. Evans, Tim P.
TS 35.215 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications Mr. Sahlin, Bengt
TS 35.216 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification Mr. Sahlin, Bengt
TS 35.217 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 3: Implementors' test data Mr. Sahlin, Bengt
TS 35.218 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 4: Design conformance test data Mr. Sahlin, Bengt
TS 35.221 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications Ms. Qi, Yuan
TS 35.222 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification Ms. Qi, Yuan
TS 35.223 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 3: Implementors' test data Ms. Qi, Yuan
TS 35.231 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification Mr. Evans, Tim P.
TS 35.232 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 2: Implementers’ test data Mr. Evans, Tim P.
TS 35.233 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 3: Design conformance test data Mr. Evans, Tim P.
TS 35.234 Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 1: General Mrs. Pauliac, Mireille
TS 35.235 Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 2: Algorithm Specification Mrs. Pauliac, Mireille
TS 35.236 Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 3: Implementors’ Test Data and Design Conformance Test Data Mrs. Pauliac, Mireille
TS 35.237 Specification of the MILENAGE-256 algorithm set: An example set of 256-bit 3GPP Authentication and Key Generation functions f1, f1*, f2, f3, f4, f5, f5* and f5**; Document 4: Summary and Results of Design and Evaluation Mrs. Pauliac, Mireille
TS 35.240 Specification of the Snow 5G based 256-bits algorithm set: specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 1: algorithm specification Mr. Orkopoulos, Stawros
TS 35.241 Specification of the Snow 5G based 256-bits algorithm set: Specification of the 256-NEA4 encryption, the 256-NIA4 integrity algorithm, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 2: implementation test data Mr. Orkopoulos, Stawros
TS 35.242 Specification of the Snow 5G based 256-bits algorithm set: Specification of the 256-NEA4 encryption, the 256-NIA4 integrity, and the 256-NCA4 authenticated encryption algorithm for 5G; Document 3: design conformance test data Mr. Orkopoulos, Stawros
TS 35.243 Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 1: algorithm specification Mr. Orkopoulos, Stawros
TS 35.244 Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 2: implementation test data Mr. Orkopoulos, Stawros
TS 35.245 Specification of the AES based 256-bits algorithm set: Specification of the 256-NEA5 encryption, the 256-NIA5 integrity, and the 256-NCA5 authenticated encryption algorithm for 5G; Document 3: design conformance test data Mr. Orkopoulos, Stawros
TS 35.246 Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 1: algorithm specification Mr. Orkopoulos, Stawros
TS 35.247 Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 2: implementation test data Mr. Orkopoulos, Stawros
TS 35.248 Specification of the ZUC based 256-bits algorithm set: Specification of the 256-NEA6 encryption, the 256-NIA6 integrity, and the 256-NCA6 authenticated encryption algorithm for 5G; Document 3: design conformance test data Mr. Orkopoulos, Stawros
TR 35.909 3G Security; Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Summary and results of design and evaluation Prof. Walker, Michael
TR 35.919 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 5: Design and evaluation report Mr. Sahlin, Bengt
TR 35.924 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 4: Design and Evaluation Report Ms. Qi, Yuan
TR 35.934 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 4: Report on the design and evaluation Mr. Barry, Aguibou
TR 35.935 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 5: Performance evaluation Mr. Barry, Aguibou
TR 35.936 Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2 ,f3, f4, f5 and f5*; Document 6: Security assessment Mr. Barry, Aguibou
TR 41.031 Fraud Information Gathering System (FIGS); Service requirements; Stage 0 Mr. Sahlin, Bengt
TR 41.033 Lawful Interception requirements for GSM Mr. Leadbeater, Alex
TS 41.061 General Packet Radio Service (GPRS); GPRS ciphering algorithm requirements Mr. Sahlin, Bengt
TS 42.009 Security aspects Mr. Sahlin, Bengt
TS 42.033 Lawful Interception; Stage 1 Mr. Leadbeater, Alex
TS 43.020 Security related network functions Mr. Sahlin, Bengt
TS 43.033 3G security; Lawful Interception; Stage 2 Mr. Leadbeater, Alex
TS 55.205 Specification of the GSM-MILENAGE algorithms: An example algorithm set for the GSM Authentication and Key Generation Functions A3 and A8 Mr. Evans, Tim P.
TS 55.216 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 1: A5/3 and GEA3 specifications Mr. Sahlin, Bengt
TS 55.217 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 2: Implementors' test data Mr. Sahlin, Bengt
TS 55.218 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 3: Design conformance test data Mr. Sahlin, Bengt
TS 55.226 3G Security; Specification of the A5/4 Encryption Algorithms for GSM and ECSD, and the GEA4 Encryption Algorithm for GPRS Dr. Prasad, Anand
TS 55.236 Specification of A8_V MILENAGE Algorithm: An example algorithm for the key generation function A8_V Miss Jerichow, Anja
TS 55.241 Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); GIA4 specification Mr. Evans, Tim P.
TS 55.242 Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); Implementers' test data Mr. Evans, Tim P.
TS 55.243 Specification of the GIA4 integrity algorithm for General Packet Radio Service (GPRS); Design conformance test data Mr. Evans, Tim P.
TS 55.251 Specification of the GEA5 and GIA5 encryption algorithms for General Packet Radio Service (GPRS); GEA5 and GIA5 algorithm specification Mr. Evans, Tim P.
TS 55.252 Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); Implementers' test data Mr. Evans, Tim P.
TS 55.253 Specification of the GEA5 encryption and GIA5 integrity algorithms for General Packet Radio Service (GPRS); Design conformance test data Mr. Evans, Tim P.
TR 55.919 3G Security; Specification of the A5/3 encryption algorithms for GSM and ECSD, and the GEA3 encryption algorithm for GPRS; Document 4: Design and evaluation report Mr. Sahlin, Bengt