References from draft-aanchal4-ntp-mac
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
References Referenced by |
normatively references | ||
draft-gueron-gcmsiv |
AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption
References Referenced by |
informatively references | ||
RFC 2104 |
HMAC: Keyed-Hashing for Message Authentication
References Referenced by |
Informational | normatively references | |
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
RFC 4106 |
The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (ESP)
References Referenced by |
Proposed Standard | normatively references | |
RFC 4493 |
The AES-CMAC Algorithm
References Referenced by |
Informational | normatively references | |
RFC 4543 |
The Use of Galois Message Authentication Code (GMAC) in IPsec ESP and AH
References Referenced by |
Proposed Standard | normatively references | |
RFC 5905 |
Network Time Protocol Version 4: Protocol and Algorithms Specification
References Referenced by |
Proposed Standard | normatively references | |
RFC 6151 |
Updated Security Considerations for the MD5 Message-Digest and the HMAC-MD5 Algorithms
References Referenced by |
Informational | normatively references | |
RFC 7539 |
ChaCha20 and Poly1305 for IETF Protocols
References Referenced by |
Informational | normatively references | |
RFC 7630 |
HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3
References Referenced by |
Proposed Standard | normatively references |