63GPP TS 35.205 version 5.0.0-2002, Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions, f1, f1*, f2, f3, f4, f5 and f5*, document 1: algorithm specification(Release 5)[S].
73GPP TS 35.202 version 5.0.0-2002, Specification of 3GPP confidentiality and integrity algorithm, document 2: KASUMI specification(Release 5)[S].
83G TS 33.105 version 3.8.0-2001,3G Security Cryptographic Algorithm Requirements[S].
93G TR 33.901 version 3.0.0-2001,3G Security Criteria for Cryptographic Algorithm Design Process[S].
10TERADA R, Pinheiro P G, Koyama K. A new version of FEAL, stronger against differential cryptanalysis[J]. IEICE Trans Fundamentals, 1996,E79-A(1): 28-34.
二级参考文献19
1[1]3G TS 33. 102 v4.1.0-2001,3rd, Generation partnership project; technical specification group services and system aspects, 3G security; security architecture[S].
2[2]ETSI/SAGE specification,v1.0-1999,Specification of 3GPP confidentiality and integrity algrithm,part 1:f8 and f9 specification[S].
3[3]ETSI/SAGE specification,v1.0-1999,Specification of 3GPP confidentiality and integrity algrithm,part 2:KASUMI specification[S].
4[4]ETSI/SAGE specification,v1.0-2000,Specification of the MILENAGE algorithm set: an example algorithm set for the 3GPP authentication and key generation functions, f1, f1*, f2, f3, f4, f5 and f5*,document 1: algorithm specification[S].
5[5]Sarvar Patel,Zulfikar Ramzan. Use of SHA-1 for AKA f0-f5[Z],Yokohama,Japan:3GPP TSG SA WG3 security-S3#13 S3-000315, 2000.
6[6]3G TS 33. 105,v3.8.0-2001,3rd. Generation partnership project; technical specification group services and system aspects; 3G security; cryptographic algorithm requirements[S].
7[7]ISO/IEC 9798-4-1999,Information technology-security techniques-entity authentication-part 4:Mechanisms using a cryptographic check function[S].
83G TS 33.120 Version 3.0.0 3G Security: Security Principles and Objectives.
93G TS 33.103 Version 1.0.0 3G Security: Integration Guidelines.
103G TS 33.102 Version 3.1.0 3G Security: Security Architecture.