<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.pocero-lake-authkemsig-edhoc" target="https://datatracker.ietf.org/doc/html/draft-pocero-lake-authkemsig-edhoc-00">
   <front>
      <title>Hybrid KEM/Signature-Based Methods for Scenarios with Asymmetric Device Constraints</title>
      <author initials="L. P." surname="Fraile" fullname="Lidia Pocero Fraile">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <author initials="C." surname="Koulamas" fullname="Christos Koulamas">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <author initials="A. P." surname="Fournaris" fullname="Apostolos P. Fournaris">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <author initials="E." surname="Haleplidis" fullname="Evangelos Haleplidis">
         <organization>ISI, R.C. ATHENA</organization>
      </author>
      <date month="May" day="22" year="2026" />
      <abstract>
	 <t>   This document extends the KEM-based Authentication for EDHOC draft
   [I-D.pocero-lake-authkem-edhoc] by defining additional quantum-
   resistant authentication methods that support combined authentication
   approaches, where one party authenticates using a KEM-based mechanism
   and the other using a post-quantum signature scheme.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-pocero-lake-authkemsig-edhoc-00" />
   
</reference>
