Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0109/R1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 14
ÇѱÛÇ¥Áظí Çؽà ÇÔ¼ö ÀÌ¿ë Áöħ
¿µ¹®Ç¥Áظí Guideline on Use of Hash Function
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Çؽà ÇÔ¼öÀÇ ÁÖ¿ä ÀÌ¿ë »ç·Ê¸¦ ºÐ·ùÇÏ°í, °¢ »ç·Êº°·Î ¿ä±¸µÇ´Â Çؽà ÇÔ¼öÀÇ ¾ÈÀü¼º ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard categorizes the major use cases of hash functions and presents the security requirements of a hash function for each case.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0109R1.pdf TTAK.KO-12.0109R1.pdf            

ÀÌÀü
IMT-2000 3GPP2 -HRPD ¸Á Á¢¼Ó±Ô°ÝÀ» À§ÇÑ »óÈ£¿î¿ë ±Ô°Ý (Release B)
´ÙÀ½
IMT-2000 3GPP2 - ÆÐŶ Á¶Á¤ ±â´É»ó¿¡¼­ÀÇ ¼¼¼Ç Á¶Á¤±â´ÉÀ» °®´Â HRPD ¹«¼± Á¢¼Ó ³×Æ®¿÷ ÀÎÅÍÆäÀ̽º¸¦ À§ÇÑ »óÈ£¿î¿ë ±Ô°Ý (Release A)