References from draft-ietf-lake-edhoc
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
BCP 188 |
Pervasive Monitoring Is an Attack References Referenced by |
Best Current Practice | informatively references | |
draft-ietf-6tisch-dtsecurity-zerotouch-join |
6tisch Zero-Touch Secure Join protocol References Referenced by |
informatively references | ||
draft-ietf-ace-oauth-authz |
Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth) References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-core-echo-request-tag |
CoAP: Echo, Request-Tag, and Token Processing References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-core-resource-directory |
CoRE Resource Directory References Referenced by |
Proposed Standard | informatively references | |
draft-ietf-cose-x509 |
CBOR Object Signing and Encryption (COSE): Header parameters for carrying and referencing X.509 certificates References Referenced by |
Proposed Standard | normatively references | |
draft-ietf-lake-reqs |
Requirements for a Lightweight AKE for OSCORE References Referenced by |
normatively references | ||
draft-ietf-lwig-security-protocol-comparison |
Comparison of CoAP Security Protocols References Referenced by |
informatively references | ||
draft-ietf-tls-dtls13 |
The Datagram Transport Layer Security (DTLS) Protocol Version 1.3 References Referenced by |
Proposed Standard | informatively references | |
draft-palombini-core-oscore-edhoc |
Combining EDHOC and OSCORE References Referenced by |
informatively references | ||
draft-selander-ace-ake-authz |
Lightweight Authorization for Authenticated Key Exchange. References Referenced by |
informatively references | ||
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
RFC 5116 |
An Interface and Algorithms for Authenticated Encryption References Referenced by |
Proposed Standard | normatively references | |
RFC 5869 |
HMAC-based Extract-and-Expand Key Derivation Function (HKDF) References Referenced by |
Informational | normatively references | |
RFC 6090 |
Fundamental Elliptic Curve Cryptography Algorithms References Referenced by |
Informational | normatively references | |
RFC 6979 |
Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) References Referenced by |
Informational | normatively references | |
RFC 7228 |
Terminology for Constrained-Node Networks References Referenced by |
Informational | informatively references | |
RFC 7252 |
The Constrained Application Protocol (CoAP) References Referenced by |
Proposed Standard | normatively references | |
RFC 7258 |
Pervasive Monitoring Is an Attack References Referenced by |
Best Current Practice | informatively references | |
RFC 7296 |
Internet Key Exchange Protocol Version 2 (IKEv2) References Referenced by |
Internet Standard | informatively references | |
RFC 7748 |
Elliptic Curves for Security References Referenced by |
Informational | normatively references | |
RFC 7959 |
Block-Wise Transfers in the Constrained Application Protocol (CoAP) References Referenced by |
Proposed Standard | normatively references | |
RFC 8152 |
CBOR Object Signing and Encryption (COSE) References Referenced by |
Proposed Standard | normatively references | |
RFC 8174 |
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words References Referenced by |
Best Current Practice | normatively references | |
RFC 8376 |
Low-Power Wide Area Network (LPWAN) Overview References Referenced by |
Informational | normatively references | |
RFC 8446 |
The Transport Layer Security (TLS) Protocol Version 1.3 References Referenced by |
Proposed Standard | informatively references | |
RFC 8610 |
Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures References Referenced by |
Proposed Standard | normatively references | |
RFC 8613 |
Object Security for Constrained RESTful Environments (OSCORE) References Referenced by |
Proposed Standard | normatively references | |
RFC 8742 |
Concise Binary Object Representation (CBOR) Sequences References Referenced by |
Proposed Standard | normatively references | |
RFC 8949 |
Concise Binary Object Representation (CBOR) References Referenced by |
Internet Standard | normatively references | |
STD 79 |
Internet Key Exchange Protocol Version 2 (IKEv2) References Referenced by |
Internet Standard | informatively references | |
STD 94 |
Concise Binary Object Representation (CBOR) References Referenced by |
Internet Standard | normatively references |