<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.smyslov-ipsecme-ikev2-mceliece" target="https://datatracker.ietf.org/doc/html/draft-smyslov-ipsecme-ikev2-mceliece-01">
   <front>
      <title>Using Classic McEliece in the Internet Key Exchange Protocol Version 2 (IKEv2)</title>
      <author initials="V." surname="Smyslov" fullname="Valery Smyslov">
         <organization>ELVIS-PLUS</organization>
      </author>
      <author initials="Y." surname="Nir" fullname="Yoav Nir">
         <organization>Dell Technologies</organization>
      </author>
      <date month="October" day="6" year="2025" />
      <abstract>
	 <t>   This document specifies how Classic McEliece Key Encapsulation
   Mechanism (KEM) is used to generate keys in the Internet Key Exchange
   version 2 (IKEv2) protocol.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-smyslov-ipsecme-ikev2-mceliece-01" />
   
</reference>
