%% You should probably cite draft-ietf-cose-hash-algs instead of this I-D. @techreport{schaad-cose-hash-algs-01, number = {draft-schaad-cose-hash-algs-01}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-schaad-cose-hash-algs/01/}, author = {Jim Schaad}, title = {{CBOR Object Signing and Encryption (COSE): Hash Algorithms}}, pagetotal = 5, year = 2019, month = feb, day = 25, abstract = {The CBOR Object Signing and Encryption (COSE) syntax {[}I-D.ietf-cose-rfc8152bis-struct{]} does not define any direct methods for using hash algorithms. There are however circumstances where hash algorithms are used: Indirect signatures where the hash of one or more contents are signed. X.509 certificate or other object identification by the use of a thumbprint. This document defines a set of hash algorithms that are identified by COSE Algorithm Identifiers.}, }