[{"name":"S3-242776","title":"Editorial Modifications","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":30,"status":"revised","reservation_date":"2024-08-08 09:19:26","uploaded":"2024-08-12 10:18:48","revisionof":"","revisedto":"S3-243648","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242776.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242777","title":"Proposed changes to the Conclusions","source":"Nokia, Nokia Shanghai Bell","contact":"Stawros Orkopoulos","contact-id":96699,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":10,"status":"approved","reservation_date":"2024-08-08 09:22:01","uploaded":"2024-08-12 10:18:48","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242777.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242786","title":"Annexes on 256-bit security and backwards compatibility","source":"KDDI Corporation, Cablelabs, Ericsson","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":20,"status":"revised","reservation_date":"2024-09-08 06:36:22","uploaded":"2024-08-09 07:31:41","revisionof":"","revisedto":"S3-243647","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242786.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242787","title":"pCR on Editorial cleanup","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":40,"status":"approved","reservation_date":"2024-09-08 06:39:03","uploaded":"2024-08-09 07:31:41","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242787.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242788","title":"Presentation of Specification to TSG: TR 33.700-41","source":"KDDI Corporation","contact":"Min Kyoung Cho","contact-id":97833,"tdoctype":"TS or TR cover","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":50,"status":"revised","reservation_date":"2024-09-08 06:41:41","uploaded":"2024-08-09 07:31:41","revisionof":"","revisedto":"S3-243649","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242788.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-242914","title":"LS on assigning algorithm identifier values for 256-bit algorithms","source":"ZTE Corporation","contact":"Yuze Liu","contact-id":97142,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":90,"status":"noted","reservation_date":"2024-12-08 03:11:05","uploaded":"2024-08-12 08:47:36","revisionof":"","revisedto":"","release":"Rel-19","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"CT1","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-242914.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243647","title":"Annexes on 256-bit security and backwards compatibility","source":"KDDI Corporation, Cablelabs, Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":21,"status":"approved","reservation_date":"2024-08-27 15:28:03","uploaded":"2024-08-27 15:31:07","revisionof":"S3-242786","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243647.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243648","title":"Editorial Modifications","source":"Nokia, Nokia Shanghai Bell","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":31,"status":"approved","reservation_date":"2024-08-27 15:28:03","uploaded":"2024-08-27 15:31:07","revisionof":"S3-242776","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243648.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243649","title":"Presentation of Specification to TSG: TR 33.700-41","source":"KDDI Corporation","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"TS or TR cover","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":51,"status":"approved","reservation_date":"2024-08-27 15:28:03","uploaded":"2024-08-27 15:31:07","revisionof":"S3-242788","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.2.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243649.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0},
{"name":"S3-243655","title":"Draft TR 33.700-41","source":"KDDI","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"draft TR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":36,"ainumber":"5.5","ainame":"Study on enabling a cryptographic algorithm transition to 256-bits","tdoc_agenda_sort_order":365500,"status":"approved","reservation_date":"2024-08-27 15:28:04","uploaded":"2024-08-30 08:41:07","revisionof":"","revisedto":"","release":"Rel-19","crspec":"33.700-41","crspecversion":"0.3.0","workitem":[{"winame":"FS_CAT256"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"https:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_117_Maastricht\/Docs\/S3-243655.zip","group":"S3","meeting":"S3-117","year":2024,"uicc_affected":"","me_affected":"","ran_affected":"","cn_affected":"","clauses_affected":"","crsinpack":null,"crsinpacknumber":0}]