[{"name":"S3-200987","title":"Update on RSA exponent requirement","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":9870,"status":"revised","reservation_date":"2020-04-30 10:11:33","uploaded":"2020-04-30 10:27:11","revisionof":"","revisedto":"S3-201399","release":"Rel-16","crspec":33.31,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":108.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-200987.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-201045","title":"Elliptic Curve Group Size","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":10450,"status":"revised","reservation_date":"2020-04-30 14:03:57","uploaded":"2020-04-30 14:11:28","revisionof":"","revisedto":"S3-201422","release":"Rel-16","crspec":33.21,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":69.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-201045.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-201046","title":"TLS 1.3 cipher suites","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":10460,"status":"revised","reservation_date":"2020-04-30 14:04:03","uploaded":"2020-04-30 14:11:28","revisionof":"","revisedto":"S3-201423","release":"Rel-16","crspec":33.21,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":70.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-201046.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-201047","title":"Corrections on PKCS#1v1.5 padding and Elliptic Curves","source":"Ericsson","contact":"Pinar Comak","contact-id":85151,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":10470,"status":"revised","reservation_date":"2020-04-30 14:13:08","uploaded":"2020-04-30 14:20:41","revisionof":"","revisedto":"S3-201419","release":"Rel-16","crspec":33.31,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":109.0,"crrevision":"","crcategory":"F","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-201047.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-201399","title":"Update on RSA exponent requirement","source":"Apple Computer Trading Co. Ltd","contact":"Ivy Guo","contact-id":76339,"tdoctype":"CR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":13990,"status":"agreed","reservation_date":"2020-05-18 05:44:26","uploaded":"2020-05-18 07:17:57","revisionof":"S3-200987","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":108.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200363","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-201399.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-201419","title":"Corrections on PKCS#1v1.5 padding and Elliptic Curves","source":"Ericsson","contact":"Pinar Comak","contact-id":85151,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":14190,"status":"agreed","reservation_date":"2020-05-18 10:22:51","uploaded":"2020-05-18 10:32:03","revisionof":"S3-201047","revisedto":"","release":"Rel-16","crspec":33.31,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":109.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200363","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-201419.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-201422","title":"Elliptic Curve Group Size","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":14220,"status":"agreed","reservation_date":"2020-05-18 11:13:43","uploaded":"2020-05-18 11:22:49","revisionof":"S3-201045","revisedto":"","release":"Rel-16","crspec":33.21,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":69.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200363","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-201422.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-201423","title":"TLS 1.3 cipher suites","source":"Ericsson","contact":"Ferhat Karakoc","contact-id":86196,"tdoctype":"CR","for":"Agreement","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"4.19","ainame":"3GPP profiles for cryptographic algorithms and security protocols (Rel-16)","tdoc_agenda_sort_order":14230,"status":"agreed","reservation_date":"2020-05-18 11:24:41","uploaded":"2020-05-18 11:30:57","revisionof":"S3-201046","revisedto":"","release":"Rel-16","crspec":33.21,"crspecversion":"16.3.0","workitem":[{"winame":"CryptPr"}],"crnumber":70.0,"crrevision":1.0,"crcategory":"F","tsg_crp":"SP-200363","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_99e\/Docs\/S3-201423.zip","group":"S3","meeting":"S3-ah-38163","year":2020,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]