<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.irtf-cfrg-aead-limits" target="https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-aead-limits-05">
   <front>
      <title>Usage Limits on AEAD Algorithms</title>
      <author initials="F." surname="Günther" fullname="Felix Günther">
         <organization>ETH Zurich</organization>
      </author>
      <author initials="M." surname="Thomson" fullname="Martin Thomson">
         <organization>Mozilla</organization>
      </author>
      <author initials="C. A." surname="Wood" fullname="Christopher A. Wood">
         <organization>Cloudflare</organization>
      </author>
      <date month="July" day="11" year="2022" />
      <abstract>
	 <t>   An Authenticated Encryption with Associated Data (AEAD) algorithm
   provides confidentiality and integrity.  Excessive use of the same
   key can give an attacker advantages in breaking these properties.
   This document provides simple guidance for users of common AEAD
   functions about how to limit the use of keys in order to bound the
   advantage given to an attacker.  It considers limits in both single-
   and multi-key settings.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-irtf-cfrg-aead-limits-05" />
   
</reference>
