References to rfc8152
These dependencies are extracted using heuristics looking for strings with particular prefixes. Notably, this means that references to I-Ds by title only are not reflected here. If it's really important, please inspect the documents' references sections directly.
Showing RFCs and active Internet-Drafts, sorted by reference type, then document name.
| Document | Title | Status | Type | Downref |
|---|---|---|---|---|
| draft-birkholz-scitt-architecture |
An Architecture for Trustworthy and Transparent Digital Supply Chains
References Referenced by |
normatively references | ||
| draft-bormann-cbor-notable-tags |
Notable CBOR Tags
References Referenced by |
normatively references | ||
| draft-bormann-t2trg-sworn |
SWORN: Secure Wake on Radio Nudging
References Referenced by |
normatively references | ||
| draft-ietf-ace-dtls-authorize |
Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE)
References Referenced by |
Proposed Standard | normatively references | |
| draft-ietf-ace-mqtt-tls-profile |
Message Queuing Telemetry Transport (MQTT)-TLS profile of Authentication and Authorization for Constrained Environments (ACE) Framework
References Referenced by |
Proposed Standard | normatively references | |
| draft-ietf-ace-oauth-authz |
Authentication and Authorization for Constrained Environments (ACE) using the OAuth 2.0 Framework (ACE-OAuth)
References Referenced by |
Proposed Standard | normatively references | |
| draft-ietf-ace-oauth-params |
Additional OAuth Parameters for Authorization in Constrained Environments (ACE)
References Referenced by |
Proposed Standard | normatively references | |
| draft-ietf-cose-cbor-encoded-cert |
CBOR Encoded X.509 Certificates (C509 Certificates)
References Referenced by |
normatively references | ||
| draft-ietf-cose-hpke |
Use of Hybrid Public-Key Encryption (HPKE) with CBOR Object Signing and Encryption (COSE)
References Referenced by |
normatively references | ||
| draft-ietf-cose-x509 |
CBOR Object Signing and Encryption (COSE): Header parameters for carrying and referencing X.509 certificates
References Referenced by |
Proposed Standard | normatively references | |
| draft-ietf-lwig-curve-representations |
Alternative Elliptic Curve Representations
References Referenced by |
Informational | normatively references | |
| draft-ietf-rats-eat |
The Entity Attestation Token (EAT)
References Referenced by |
normatively references | ||
| draft-ietf-rats-uccs |
A CBOR Tag for Unprotected CWT Claims Sets
References Referenced by |
normatively references | ||
| draft-ietf-suit-firmware-encryption |
Firmware Encryption with SUIT Manifests
References Referenced by |
normatively references | ||
| draft-ietf-suit-manifest |
A Concise Binary Object Representation (CBOR)-based Serialization Format for the Software Updates for Internet of Things (SUIT) Manifest
References Referenced by |
normatively references | ||
| draft-ietf-teep-protocol |
Trusted Execution Environment Provisioning (TEEP) Protocol
References Referenced by |
normatively references | ||
| draft-moskowitz-drip-crowd-sourced-rid |
Crowd Sourced Remote ID
References Referenced by |
normatively references | ||
| draft-tschofenig-rats-psa-token |
Arm's Platform Security Architecture (PSA) Attestation Token
References Referenced by |
normatively references | ||
| RFC 8392 |
CBOR Web Token (CWT)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8613 |
Object Security for Constrained RESTful Environments (OSCORE)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8747 |
Proof-of-Possession Key Semantics for CBOR Web Tokens (CWTs)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8769 |
Cryptographic Message Syntax (CMS) Content Types for Concise Binary Object Representation (CBOR)
References Referenced by |
Informational | normatively references | |
| RFC 8778 |
Use of the HSS/LMS Hash-Based Signature Algorithm with CBOR Object Signing and Encryption (COSE)
References Referenced by |
Proposed Standard | normatively references | |
| RFC 8812 |
CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms
References Referenced by |
Proposed Standard | normatively references | |
| RFC 9021 |
Use of the Walnut Digital Signature Algorithm with CBOR Object Signing and Encryption (COSE)
References Referenced by |
Informational | normatively references | |
| RFC 9031 |
Constrained Join Protocol (CoJP) for 6TiSCH
References Referenced by |
Proposed Standard | normatively references | |
| RFC 9173 |
Default Security Contexts for Bundle Protocol Security (BPSec)
References Referenced by |
Proposed Standard | normatively references | |
| draft-ietf-anima-brski-prm |
BRSKI with Pledge in Responder Mode (BRSKI-PRM)
References Referenced by |
informatively references | ||
| draft-ietf-cbor-file-magic |
On storing CBOR encoded items on stable storage
References Referenced by |
Proposed Standard | informatively references | |
| draft-ietf-core-attacks-on-coap |
Attacks on the Constrained Application Protocol (CoAP)
References Referenced by |
informatively references | ||
| draft-ietf-cose-countersign |
CBOR Object Signing and Encryption (COSE): Countersignatures
References Referenced by |
Internet Standard | informatively references | |
| draft-ietf-cose-hash-algs |
CBOR Object Signing and Encryption (COSE): Hash Algorithms
References Referenced by |
Informational | informatively references | |
| draft-ietf-cose-rfc8152bis-algs |
CBOR Object Signing and Encryption (COSE): Initial Algorithms
References Referenced by |
Informational | informatively references | |
| draft-ietf-cose-rfc8152bis-struct |
CBOR Object Signing and Encryption (COSE): Structures and Process
References Referenced by |
Internet Standard | informatively references | |
| draft-ietf-opsawg-mud-tls |
Manufacturer Usage Description (MUD) (D)TLS Profiles for IoT Devices
References Referenced by |
informatively references | ||
| draft-irtf-t2trg-rest-iot |
Guidance on RESTful Design for Internet of Things Systems
References Referenced by |
Informational | informatively references | |
| draft-mattsson-cfrg-det-sigs-with-noise |
Deterministic ECDSA and EdDSA Signatures with Additional Randomness
References Referenced by |
informatively references | ||
| draft-mattsson-t2trg-amplification-attacks |
Amplification Attacks Using the Constrained Application Protocol (CoAP)
References Referenced by |
informatively references | ||
| draft-rieckers-emu-eap-ute |
User-assisted Trust Establishment (EAP-UTE)
References Referenced by |
informatively references | ||
| draft-selander-ace-ake-authz |
Lightweight Authorization for Authenticated Key Exchange.
References Referenced by |
informatively references | ||
|
RFC 8230
As draft-ietf-cose-msg |
Using RSA Algorithms with CBOR Object Signing and Encryption (COSE) Messages
References Referenced by |
Proposed Standard | informatively references | |
| RFC 8387 |
Practical Considerations and Implementation Experiences in Securing Smart Object Networks
References Referenced by |
Informational | informatively references | |
| RFC 8576 |
Internet of Things (IoT) Security: State of the Art and Challenges
References Referenced by |
Informational | informatively references | |
| RFC 8610 |
Concise Data Definition Language (CDDL): A Notational Convention to Express Concise Binary Object Representation (CBOR) and JSON Data Structures
References Referenced by |
Proposed Standard | informatively references | |
| RFC 8742 |
Concise Binary Object Representation (CBOR) Sequences
References Referenced by |
Proposed Standard | informatively references |