[{"name":"S3-190107","title":"Expectations and requirements for 256 bit algorithms","source":"ETSI SAGE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"6.3","ainame":"ETSI SAGE","tdoc_agenda_sort_order":40300,"status":"withdrawn","reservation_date":"2019-01-19 23:58:54","uploaded":"2019-01-20 00:02:55","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190107.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190402","title":"128-EIA3 maximum message size","source":"ETSI SAGE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"6.3","ainame":"ETSI SAGE","tdoc_agenda_sort_order":40200,"status":"noted","reservation_date":"2019-01-24 16:36:55","uploaded":"2019-01-24 16:49:22","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190402.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190403","title":"Expectations and requirements for 256 bit algorithms","source":"ETSI SAGE","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"Discussion","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"6.3","ainame":"ETSI SAGE","tdoc_agenda_sort_order":1070,"status":"replied to","reservation_date":"2019-01-24 16:55:33","uploaded":"2019-01-24 16:57:12","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"S3-190407, S3-190407","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190403.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-190407","title":"Reply to: Expectations and requirements for 256 bit algorithms","source":"Vodafone","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS out","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":10,"ainumber":"6.3","ainame":"ETSI SAGE","tdoc_agenda_sort_order":1071,"status":"approved","reservation_date":"2019-02-01 09:58:38","uploaded":"2019-02-01 09:58:38","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"S3-190403","lsto":"ETSI SAGE","Cc":"ETSI TC CYBER","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_94_Kochi\/Docs\/S3-190407.zip","group":"S3","meeting":"S3-94","year":2019,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]