[{"name":"S3-170657","title":"Support of 256-bit Keys and Algorithms","source":"AT&T","contact":"Martin Dolly","contact-id":44313,"tdoctype":"discussion","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":7270,"status":"noted","reservation_date":"2017-03-19 18:39:40","uploaded":"2017-03-20 00:04:49","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170657.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170726","title":"Questions and Interim agreements for 256-bit cryptographic algorithms","source":"CATR, CATT, China Mobile, China Unicom, Huawei, Hisilicon, ZTE Corporation","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":8730,"status":"noted","reservation_date":"2017-03-20 07:34:19","uploaded":"2017-03-20 08:30:49","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"1.0.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170726.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170727","title":"Questions and Interim agreements for 128-bit cryptographic algorithms","source":"CATR, CATT, China Mobile, China Unicom, Huawei, Hisilicon, ZTE Corporation","contact":"He Li","contact-id":62828,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":8750,"status":"revised","reservation_date":"2017-03-20 07:38:09","uploaded":"2017-03-20 08:30:49","revisionof":"","revisedto":"S3-170953","release":"Rel-14","crspec":33.899,"crspecversion":"1.0.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170727.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170826","title":"Starting the discussion on security algorithms support for 5G","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"discussion","for":"Decision","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":7260,"status":"merged","reservation_date":"2017-03-20 13:54:48","uploaded":"2017-03-20 14:39:21","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170826.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170828","title":"Proposed inputs to the key derivation of ciphering and integrity keys","source":"Qualcomm Incorporated","contact":"Adrian Escott","contact-id":24089,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":8760,"status":"revised","reservation_date":"2017-03-20 13:54:48","uploaded":"2017-03-20 14:39:21","revisionof":"","revisedto":"S3-170955","release":"Rel-14","crspec":33.899,"crspecversion":"1.0.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170828.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170886","title":"Questions and Interim agreements for 128-bit cryptographic algorithms","source":"CATR, CATT, China Mobile, China Unicom, Huawei, Hisilicon, ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":8752,"status":"approved","reservation_date":"2017-04-04 11:32:59","uploaded":"2017-04-04 11:32:59","revisionof":"S3-170953","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"1.0.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170886.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170953","title":"Questions and Interim agreements for 128-bit cryptographic algorithms","source":"CATR, CATT, China Mobile, China Unicom, Huawei, Hisilicon, ZTE Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":8751,"status":"revised","reservation_date":"2017-04-04 11:32:59","uploaded":"2017-04-04 11:32:59","revisionof":"S3-170727","revisedto":"S3-170886","release":"Rel-14","crspec":33.899,"crspecversion":"1.0.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170953.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170955","title":"Proposed inputs to the key derivation of ciphering and integrity keys","source":"Qualcomm Incorporated","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":22,"ainumber":"5.1.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":8761,"status":"approved","reservation_date":"2017-04-04 11:35:07","uploaded":"2017-04-04 11:35:07","revisionof":"S3-170828","revisedto":"","release":"Rel-14","crspec":33.899,"crspecversion":"1.0.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86b_Busan\/Docs\/S3-170955.zip","group":"S3","meeting":"S3-ah-19130","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]