Browse > Article

5G+ 초연결 환경을 위한 암호기술 연구  

Jang, Chan-Guk (국민대학교 금융정보보안학과)
Kim, Hyeon-Gi (국민대학교 금융정보보안학과)
Yun, Seung-Hwan (국민대학교 산학협력단)
Lee, Ok-Yeon (국민대학교 정보보안암호수학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 TS 35.205, "3G Security; Specification of the MILENAGE algorithm set: An example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: General", 2020
2 TS 35.231, "Specification of the TUAK algorithm set: A second example algorithm set for the 3GPP authentication and key generation functions f1, f1*, f2, f3, f4, f5 and f5*; Document 1: Algorithm specification", 2020
3 T. Specification, "TS 33 401 - V14.2.0 - Universal Mobile Telecommunications System(UMTS) 3G security Security Architecture(3GPP TS 33.401 version 14.2.0 Release 14)", 2017
4 T. Specification, "TS 33 102 - V16.0.0 - 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Security architecture (3GPP TS.33. 102 version 16.0.0 Release 16)
5 Lily Chen, "Recommendation for Key Derivation Using Pseudorandom Functions" (Revised), NIST Special Publication 800-108, October 2009
6 Elaine Barker, John Kelsey, "Recommendation for Random Number Generation Using Deterministic Random Bit Generators", NIST Special Publication 800-90A, June, 2015
7 3GPP TS 33.501, "Security Architecture and pro- cedures for 5G System", 2020.09
8 ITU-R, "Framework and overall objectives of the future development of IMT for 2020 and beyond", 2015.09