<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.reddy-tls-composite-mldsa" target="https://datatracker.ietf.org/doc/html/draft-reddy-tls-composite-mldsa-05">
   <front>
      <title>Use of Composite ML-DSA in TLS 1.3</title>
      <author initials="T." surname="Reddy.K" fullname="Tirumaleswar Reddy.K">
         <organization>Nokia</organization>
      </author>
      <author initials="T." surname="Hollebeek" fullname="Tim Hollebeek">
         <organization>DigiCert</organization>
      </author>
      <author initials="J." surname="Gray" fullname="John Gray">
         <organization>Entrust Limited</organization>
      </author>
      <author initials="S." surname="Fluhrer" fullname="Scott Fluhrer">
         <organization>Cisco Systems</organization>
      </author>
      <date month="July" day="4" year="2025" />
      <abstract>
	 <t>   Compositing the post-quantum ML-DSA signature with traditional
   signature algorithms provides protection against potential breaks or
   critical bugs in ML-DSA or the ML-DSA implementation.  This document
   specifies how such a composite signature can be formed using ML-DSA
   with RSA-PKCS#1 v1.5, RSA-PSS, ECDSA, Ed25519, and Ed448 to provide
   authentication in TLS 1.3.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-reddy-tls-composite-mldsa-05" />
   
</reference>
