[{"name":"S3-161847","title":"The Impact of Quantum Computers and Post Quantum Cryptography","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"discussion","for":"Discussion","abstract":"","secretary_remarks":"-","agenda_item_sort_order":65,"ainumber":"8.6.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":18470,"status":"noted","reservation_date":"2016-10-31 12:22:35","uploaded":"2016-10-31 12:40:05","revisionof":"","revisedto":"","release":"","crspec":"","crspecversion":"","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161847.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161851","title":"Update of Key issue #17.2: Quantum safe cryptography","source":"Ericsson","contact":"Christine Jost","contact-id":49662,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":65,"ainumber":"8.6.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":18510,"status":"revised","reservation_date":"2016-10-31 12:31:45","uploaded":"2016-10-31 12:40:05","revisionof":"","revisedto":"S3-162135","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161851.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-161893","title":"pCR to TR 33.899: Quantum safe cryptography solutions","source":"VODAFONE Group Plc","contact":"Tim P. Evans","contact-id":24416,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"-","agenda_item_sort_order":65,"ainumber":"8.6.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":18930,"status":"approved","reservation_date":"2016-10-31 13:48:33","uploaded":"2016-10-31 15:02:14","revisionof":"","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":"","crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-161893.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0},
{"name":"S3-162135","title":"Update of Key issue #17.2: Quantum safe cryptography","source":"Ericsson","contact":"Mirko Cano Soveri","contact-id":41957,"tdoctype":"pCR","for":"Approval","abstract":"","secretary_remarks":"","agenda_item_sort_order":65,"ainumber":"8.6.17","ainame":"Cryptographic algorithms","tdoc_agenda_sort_order":18511,"status":"approved","reservation_date":"2016-11-24 09:36:13","uploaded":"2016-11-24 09:37:24","revisionof":"S3-161851","revisedto":"","release":"","crspec":33.899,"crspecversion":"0.5.0","workitem":[{"winame":"FS_NSA"}],"crnumber":"","crrevision":"","crcategory":"","tsg_crp":"","lsreplyto":"","lsto":"","Cc":"","lsoriginalls":"","lsreply":"","link":"http:\/\/www.3gpp.org\/ftp\/TSG_SA\/WG3_Security\/TSGS3_85_Santa_Cruz\/Docs\/S3-162135.zip","group":"S3","meeting":"S3-85","year":2016,"uicc_affected":null,"me_affected":null,"ran_affected":null,"cn_affected":null,"clauses_affected":null,"crsinpack":null,"crsinpacknumber":0}]