References from draft-ietf-core-oscore-groupcomm
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
| Document | Title | Status | Type | Downref |
|---|---|---|---|---|
| RFC 2119 |
Key words for use in RFCs to Indicate Requirement Levels
References Referenced by |
Best Current Practice | normatively references | |
| RFC 4086 |
Randomness Requirements for Security
References Referenced by |
Best Current Practice | normatively references | |
| RFC 4944 |
Transmission of IPv6 Packets over IEEE 802.15.4 Networks
References Referenced by |
Proposed Standard | informatively references | |
| RFC 4949 |
Internet Security Glossary, Version 2
References Referenced by |
Informational | informatively references | |
| RFC 5869 |
HMAC-based Extract-and-Expand Key Derivation Function (HKDF)
References Referenced by |
Informational | informatively references | |
| RFC 6282 |
Compression Format for IPv6 Datagrams over IEEE 802.15.4-Based Networks
References Referenced by |
Proposed Standard | informatively references | |
| RFC 6347 |
Datagram Transport Layer Security Version 1.2
References Referenced by |
Proposed Standard | informatively references | |
| RFC 6979 |
Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)
References Referenced by |
Informational | normatively references | Downref |
| RFC 7228 |
Terminology for Constrained-Node Networks
References Referenced by |
Informational | informatively references | |
| RFC 7252 |
The Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 7641 |
Observing Resources in the Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 7748 |
Elliptic Curves for Security
References Referenced by |
Informational | normatively references | Downref |
| RFC 7925 |
Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things
References Referenced by |
Proposed Standard | informatively references | |
| RFC 7959 |
Block-Wise Transfers in the Constrained Application Protocol (CoAP)
References Referenced by |
Proposed Standard | informatively references | |
| RFC 8032 |
Edwards-Curve Digital Signature Algorithm (EdDSA)
References Referenced by |
Informational | normatively references | Downref |
| RFC 8174 |
Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words
References Referenced by |
Best Current Practice | normatively references | |
| RFC 8392 |
CBOR Web Token (CWT)
References Referenced by |
Proposed Standard | informatively references | |
| RFC 8610 |
Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8613 |
Object Security for Constrained RESTful Environments (OSCORE)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8949 |
Concise Binary Object Representation (CBOR)
References Referenced by |
Internet Standard | normatively references | |
| RFC 9175 |
Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing
References Referenced by |
Proposed Standard | normatively references |