References to RFC 9052
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.
| Document | Title | Status | Type | Downref |
|---|---|---|---|---|
| draft-bradleylundberg-cfrg-arkg | The Asynchronous Remote Key Generation (ARKG) algorithm References Referenced by | normatively references | ||
| draft-cabanillas-nmop-authz-policy-sharing-model | Model for distributed authorization policy sharing References Referenced by | normatively references | ||
| draft-ietf-ace-authcred-dtls-profile | Additional Formats of Authentication Credentials for the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) References Referenced by | normatively references | ||
| draft-ietf-ace-coap-est-oscore | Protecting EST Payloads with OSCORE References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-ace-coap-pubsub-profile | CoAP Publish-Subscribe Profile for Authentication and Authorization for Constrained Environments (ACE) References Referenced by | normatively references | ||
| draft-ietf-ace-edhoc-oscore-profile | Ephemeral Diffie-Hellman Over COSE (EDHOC) and Object Security for Constrained Environments (OSCORE) Profile for Authentication and Authorization for Constrained Environments (ACE) References Referenced by | normatively references | ||
| draft-ietf-ace-group-oscore-profile | The Group Object Security for Constrained RESTful Environments (Group OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | normatively references | ||
| draft-ietf-ace-key-groupcomm-oscore | Key Management for Group Object Security for Constrained RESTful Environments (Group OSCORE) Using Authentication and Authorization for Constrained Environments (ACE) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-ace-oscore-gm-admin | Admin Interface for the OSCORE Group Manager References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-ace-oscore-gm-admin-coral | Using the Constrained RESTful Application Language (CoRAL) with the Admin Interface for the OSCORE Group Manager References Referenced by | normatively references | ||
| draft-ietf-ace-workflow-and-params | Short Distribution Chain (SDC) Workflow and New OAuth Parameters for the Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | normatively references | ||
| draft-ietf-anima-constrained-voucher | Constrained Bootstrapping Remote Secure Key Infrastructure (cBRSKI) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-cdni-client-access-control-metadata | CDNI Client Access Control Metadata References Referenced by | normatively references | ||
| draft-ietf-core-cacheable-oscore | Cacheable OSCORE References Referenced by | normatively references | ||
| draft-ietf-core-corr-clar | Constrained Application Protocol (CoAP): Corrections and Clarifications References Referenced by | normatively references | ||
| draft-ietf-core-groupcomm-bis | Group Communication for the Constrained Application Protocol (CoAP) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-core-oscore-groupcomm | Group Object Security for Constrained RESTful Environments (Group OSCORE) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-core-transport-indication | CoAP Transport Indication References Referenced by | normatively references | ||
| draft-ietf-cose-cbor-encoded-cert | CBOR Encoded X.509 Certificates (C509 Certificates) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-cose-dilithium | ML-DSA for JOSE and COSE References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-cose-falcon | FN-DSA for JOSE and COSE References Referenced by | normatively references | ||
| draft-ietf-cose-hash-envelope | COSE Hash Envelope References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-cose-hpke | Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-cose-sphincs-plus | SLH-DSA for JOSE and COSE References Referenced by | normatively references | ||
| draft-ietf-dtn-bpsec-cose | Bundle Protocol Security (BPSec) COSE Context References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-jose-json-web-proof | JSON Web Proof References Referenced by | normatively references | ||
| draft-ietf-lake-authz | Lightweight Authorization using Ephemeral Diffie-Hellman Over COSE (ELA) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-lake-edhoc-psk | EDHOC Authenticated with Pre-Shared Keys (PSK) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-oauth-status-list | Token Status List (TSL) References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-opsawg-yang-provenance | Applying COSE Signatures for YANG Data Provenance References Referenced by | normatively references | ||
| draft-ietf-scitt-scrapi | SCITT Reference APIs References Referenced by | normatively references | ||
| draft-ietf-spice-sd-cwt | Selective Disclosure CBOR Web Tokens (SD-CWT) References Referenced by | normatively references | ||
| draft-ietf-suit-firmware-encryption | Encrypted Payloads in SUIT Manifests References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-suit-manifest | A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-suit-mti | Cryptographic Algorithms for Internet of Things (IoT) Devices References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-suit-report | Secure Reporting of SUIT Update Status References Referenced by | Proposed Standard | normatively references | |
| draft-ietf-teep-protocol | Trusted Execution Environment Provisioning (TEEP) Protocol References Referenced by | Proposed Standard | normatively references | |
| draft-lake-pocero-authkem-edhoc | KEM-based Authentication for EDHOC References Referenced by | normatively references | ||
| draft-lake-pocero-authkem-ikr-edhoc | KEM-based Authentication for EDHOC in Initiator-Known Responder (IKR) Scenarios References Referenced by | normatively references | ||
| draft-lemmons-cose-composite-claims | Composite Token Claims References Referenced by | normatively references | ||
| draft-lundberg-cose-two-party-signing-algs | Split signing algorithms for COSE References Referenced by | normatively references | ||
| draft-ochkas-cose-ascon | Ascon-AEAD128 for COSE and JOSE References Referenced by | normatively references | ||
| draft-pocero-authkem-edhoc | KEM-based Authentication for EDHOC References Referenced by | normatively references | ||
| draft-pocero-authkem-ikr-edhoc | KEM-based Authentication for EDHOC in Initiator-Known Responder (IKR) Scenarios References Referenced by | normatively references | ||
| draft-sipos-dtn-bp-safe | Bundle Protocol (BP) Security Associations with Few Exchanges (SAFE) References Referenced by | normatively references | ||
| draft-tiloca-ace-bidi-access-control | Bidirectional Access Control in the Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | normatively references | ||
| draft-tiloca-core-oscore-discovery | Discovery of OSCORE Groups with the CoRE Resource Directory References Referenced by | normatively references | ||
| draft-tiloca-core-oscore-piv-enc | Stand-in Key Identifier and Encrypted Partial IV in the Constrained Application Protocol (CoAP) OSCORE Option References Referenced by | normatively references | ||
| draft-tiloca-t2trg-sw-update-groupcomm | Distribution of Software Updates with End-to-End Secure Group Communication and Block-Wise Transfer for CoAP References Referenced by | normatively references | ||
| RFC 9053 As draft-ietf-cose-rfc8152bis-struct | CBOR Object Signing and Encryption (COSE): Initial Algorithms References Referenced by | Informational | normatively references | |
| RFC 9054 As draft-ietf-cose-rfc8152bis-struct | CBOR Object Signing and Encryption (COSE): Hash Algorithms References Referenced by | Informational | normatively references | |
| RFC 9203 As draft-ietf-cose-rfc8152bis-struct | The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework References Referenced by | Proposed Standard | normatively references | |
| RFC 9459 | CBOR Object Signing and Encryption (COSE): AES-CTR and AES-CBC References Referenced by | Proposed Standard | normatively references | |
| draft-bormann-gendispatch-with-expert-review | Registry policies "... with Expert Review" References Referenced by | informatively references | ||
| draft-ietf-anima-brski-prm | BRSKI with Pledge in Responder Mode (BRSKI-PRM) References Referenced by | Proposed Standard | informatively references | |
| draft-ietf-cbor-cddl-modules | CDDL Module Structure References Referenced by | informatively references | ||
| draft-ietf-cbor-serialization | CBOR Serialization and Determinism References Referenced by | informatively references | ||
| draft-ietf-core-attacks-on-coap | Attacks on the Constrained Application Protocol (CoAP) References Referenced by | informatively references | ||
| draft-ietf-core-dns-over-coap | DNS over CoAP (DoC) References Referenced by | Proposed Standard | informatively references | |
| draft-ietf-core-oscore-key-limits | Key Usage Limits for OSCORE References Referenced by | informatively references | ||
| draft-ietf-cose-merkle-tree-proofs | COSE (CBOR Object Signing and Encryption) Receipts References Referenced by | Proposed Standard | informatively references | |
| draft-ietf-emu-eap-edhoc | Using the Extensible Authentication Protocol (EAP) with Ephemeral Diffie-Hellman over COSE (EDHOC) References Referenced by | Proposed Standard | informatively references | |
| draft-ietf-emu-hybrid-pqc-eapaka | Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography References Referenced by | informatively references | ||
| draft-ietf-jose-pqc-kem | Post-Quantum Key Encapsulation Mechanisms (PQ KEMs) for JOSE and COSE References Referenced by | informatively references | ||
| draft-lundblade-cbor-serialization | CBOR Serialization and Determinism References Referenced by | informatively references | ||
| draft-reddy-cose-jose-pqc-hybrid-hpke | PQ/T Hybrid KEM: HPKE with JOSE/COSE References Referenced by | informatively references | ||
| draft-reilly-government-integrity | Reilly Government Integrity Protocol (RGIP): DOI-Archived and Blockchain-Timestamped Framework for Permanent Public Records References Referenced by | informatively references | ||
| draft-reilly-sentinel-protocol | Reilly Sentinel Protocol (RSP): Blockchain-Anchored Integrity for AI Datasets, Training, Fine-Tuning, and Inference Provenance References Referenced by | informatively references | ||
| draft-rundgren-cbor-core | CBOR : : Core - CBOR Cross Platform Profile References Referenced by | Informational | informatively references | |
| draft-song-satp-implementation-guide | Secure Asset Transfer Protocol (SATP) Implementation Guide References Referenced by | informatively references |