Specifies requirements for cryptographic algorithms used in 3G network access security, including authentication, key derivation, and integrity protection.
View the full specification with interactive table of contents, version history, and AI analysis.
Read Full Specification →