1. 3GPP文档
33401-h40_Security architecture.doc
33501-hc0_Security architecture and procedures for 5G system.doc
35215-h00_Specification of the 3GPP confidentiality and integrity Algorithms UEA2 & UIA2 Document 1 UEA2 and UIA2 specifications.doc
35216-h00_Specification of the 3GPP confidentiality and integrity Algorithms UEA2 & UIA2 Document 2 SNOW 3G specification.doc
35217-h00_Specification of the 3GPP confidentiality and integrity Algorithms UEA2 & UIA2 Document 3 Implementors' test data.doc
35221-h00_Specification of the 3GPP confidentiality and integrity Algorithms EEA3 & EIA3 Document 1 EEA3 and EIA3 specifications.doc
35222-h00_Specification of the 3GPP confidentiality and integrity Algorithms EEA3 & EIA3 Document 2 ZUC specification.doc
35223-h00_Specification of the 3GPP confidentiality and integrity Algorithms EEA3 & EIA3 Document 3 Implementors' test data.doc
2 算法文档
conformance.pdf
Doc3-UEA2-UIA2-Spec-Implementors-Test-Data.pdf
eea3eia3testdatav11.pdf
eea3eia3zucv16.pdf
EEA3_EIA3_Design_Evaluation_v2_0.pdf
EEA3_EIA3_specification_v1_8.pdf
snow3gspec.pdf
uea2designevaluation.pdf
uea2uia2d1v21.pdf
3 算法规范
https://www.gsma.com/security/security-algorithms/
https://www.gsma.com/security/wp-content/uploads/2019/05/uea2designevaluation.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/conformance.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/Doc3-UEA2-UIA2-Spec-Implementors-Test-Data.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/snow3gspec.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/uea2uia2d1v21.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/EEA3_EIA3_Design_Evaluation_v2_0.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/eea3eia3testdatav11.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/eea3eia3zucv16.pdf
https://www.gsma.com/security/wp-content/uploads/2019/05/EEA3_EIA3_specification_v1_8.pdf