References from draft-smyshlyaev-tls12-gost-suites
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Document | Title | Status | Type | Downref |
---|---|---|---|---|
BCP 14 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels References Referenced by |
Best Current Practice | normatively references | |
RFC 4357 |
Additional Cryptographic Algorithms for Use with GOST 28147-89, GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms References Referenced by |
Informational | normatively references | |
RFC 5246 |
The Transport Layer Security (TLS) Protocol Version 1.2 References Referenced by |
Proposed Standard | normatively references | |
RFC 5746 |
Transport Layer Security (TLS) Renegotiation Indication Extension References Referenced by |
Proposed Standard | normatively references | |
RFC 5830 |
GOST 28147-89: Encryption, Decryption, and Message Authentication Code (MAC) Algorithms References Referenced by |
Informational | normatively references | |
RFC 6986 |
GOST R 34.11-2012: Hash Function References Referenced by |
Informational | normatively references | |
RFC 7091 |
GOST R 34.10-2012: Digital Signature Algorithm References Referenced by |
Informational | normatively references | |
RFC 7366 |
Encrypt-then-MAC for Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) References Referenced by |
Proposed Standard | normatively references | |
RFC 7627 |
Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension References Referenced by |
Proposed Standard | normatively references | |
RFC 7801 |
GOST R 34.12-2015: Block Cipher "Kuznyechik" References Referenced by |
Informational | normatively references | |
RFC 7836 |
Guidelines on the Cryptographic Algorithms to Accompany the Usage of Standards GOST R 34.10-2012 and GOST R 34.11-2012 References Referenced by |
Informational | normatively references | |
RFC 7919 |
Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS) References Referenced by |
Proposed Standard | normatively references | |
RFC 8422 |
Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier References Referenced by |
Proposed Standard | normatively references | |
RFC 8645 |
Re-keying Mechanisms for Symmetric Keys References Referenced by |
Informational | normatively references |