Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0109/R1 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑÆäÀÌÁö 14
ÇѱÛÇ¥Áظí Çؽà ÇÔ¼ö ÀÌ¿ë Áöħ
¿µ¹®Ç¥Áظí Guideline on Use of Hash Function
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº Çؽà ÇÔ¼öÀÇ ÁÖ¿ä ÀÌ¿ë »ç·Ê¸¦ ºÐ·ùÇÏ°í, °¢ »ç·Êº°·Î ¿ä±¸µÇ´Â Çؽà ÇÔ¼öÀÇ ¾ÈÀü¼º ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard categorizes the major use cases of hash functions and presents the security requirements of a hash function for each case.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0109R1.pdf TTAK.KO-12.0109R1.pdf            

ÀÌÀü
IMT-2000 3GPP - ¹°¸® ä³Î°ú ¹°¸®Ã¤³Î/Àü¼Ûä³Î ¸ÅÇÎ(FDD)(R5)
´ÙÀ½
IMT-2000 3GPP - È®»ê ¹× º¯Á¶(FDD)(R4)