References from draft-smyshlyaev-tls12-gost-suites
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
References Referenced by |
normatively references | ||
draft-smyshlyaev-tls13-gost-suites |
GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.3
References Referenced by |
Informational | informatively references | |
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
RFC 4357 |
Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms
References Referenced by |
Informational | normatively references | |
RFC 4490 |
Using the GOST 28147-89, GOST R 34.11-94, GOST R 34.10-94, and GOST R 34.10-2001 Algorithms with Cryptographic Message Syntax (CMS)
References Referenced by |
Proposed Standard | normatively references | |
RFC 5246 |
The Transport Layer Security (TLS) Protocol Version 1.2
References Referenced by |
Proposed Standard | normatively references | |
RFC 5746 |
Transport Layer Security (TLS) Renegotiation Indication Extension
References Referenced by |
Proposed Standard | normatively references | |
RFC 5830 |
GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms
References Referenced by |
Informational | normatively references | |
RFC 6986 |
GOST R 34.11-2012: Hash Function
References Referenced by |
Informational | normatively references | |
RFC 7091 |
GOST R 34.10-2012: Digital Signature Algorithm
References Referenced by |
Informational | normatively references | |
RFC 7366 |
Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
References Referenced by |
Proposed Standard | normatively references | |
RFC 7627 |
Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension
References Referenced by |
Proposed Standard | normatively references | |
RFC 7801 |
GOST R 34.12-2015: Block Cipher "Kuznyechik"
References Referenced by |
Informational | normatively references | |
RFC 7836 |
Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012
References Referenced by |
Informational | normatively references | |
RFC 7919 |
Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)
References Referenced by |
Proposed Standard | normatively references | |
RFC 8174 |
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
References Referenced by |
Best Current Practice | normatively references | |
RFC 8422 |
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier
References Referenced by |
Proposed Standard | normatively references | |
RFC 8446 |
The Transport Layer Security (TLS) Protocol Version 1.3
References Referenced by |
Proposed Standard | normatively references | |
RFC 8645 |
Re-keying Mechanisms for Symmetric Keys
References Referenced by |
Informational | normatively references | |
RFC 8891 |
GOST R 34.12-2015: Block Cipher "Magma"
References Referenced by |
Informational | normatively references |