[{"name":"S3-170007","title":"LS on Legacy Security Issues","source":"C1-164579","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":31,"ainumber":"7.6.4","ainame":"UTRAN Network Access Security","tdoc_agenda_sort_order":70,"status":"noted","reservation_date":"2017-01-16 19:47:09","uploaded":"2017-01-17 19:31:17","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170007.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170008","title":"Response LS on Legacy Security Issues","source":"R6-160125","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"LS in","for":"","abstract":"","secretary_remarks":"","agenda_item_sort_order":31,"ainumber":"7.6.4","ainame":"UTRAN Network Access Security","tdoc_agenda_sort_order":80,"status":"noted","reservation_date":"2017-01-16 19:47:09","uploaded":"2017-01-17 19:31:17","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170008.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-170262","title":"AKA: 256-bit input key K","source":"Gemalto N.V.","contact":"Mireille Pauliac","contact-id":23516,"tdoctype":"CR","for":"Agreement","abstract":"Option to use 256-bit key K for AKA","secretary_remarks":"","agenda_item_sort_order":31,"ainumber":"7.6.4","ainame":"UTRAN Network Access Security","tdoc_agenda_sort_order":2620,"status":"agreed","reservation_date":"2017-01-30 13:09:44","uploaded":"2017-01-30 13:21:14","revisionof":"","revisedto":"","release":"Rel-14","crspec":33.102,"crspecversion":"14.0.0","workitem":[{"winame":"TEI14"}],"crnumber":275.0,"crrevision":"","crcategory":"B","tsg_crp":"SP-170099","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_86_Sophia\/Docs\/S3-170262.zip","group":"S3","meeting":"S3-86","year":2017,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]