<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.pocero-lake-authkem-edhoc" target="https://datatracker.ietf.org/doc/html/draft-pocero-lake-authkem-edhoc-00">
   <front>
      <title>KEM-based Authentication for EDHOC</title>
      <author initials="L. P." surname="Fraile" fullname="Lidia Pocero Fraile">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <author initials="C." surname="Koulamas" fullname="Christos Koulamas">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <author initials="A." surname="Fournaris" fullname="Apostolos Fournaris">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <author initials="E." surname="Haleplidis" fullname="Evangelos Haleplidis">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <date month="May" day="22" year="2026" />
      <abstract>
	 <t>   This document specifies extensions to the Ephemeral Diffie-Hellman
   Over COSE (EDHOC) protocol to provide resistance against quantum
   computer adversaries by incorporating Post-Quantum Cryptography (PQC)
   Key Encapsulation Mechanisms (KEMs) for both key exchange and
   authentication.  It defines a new signature-free KEM-based
   authentication method in which both parties authenticate using KEMs,
   enabling quantum-resistant authentication without relying on digital
   signatures when PQC KEMs, such as the NIST-standardized ML-KEM, are
   used.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-pocero-lake-authkem-edhoc-00" />
   
</reference>
