2009
DOI: 10.17487/rfc5480
|View full text |Cite
|
Sign up to set email alerts
|

Elliptic Curve Cryptography Subject Public Key Information

Abstract: Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 50 publications
(60 citation statements)
references
References 0 publications
0
58
0
Order By: Relevance
“…The algorithms used to compute signatures on CA certificates, BGPsec Router Certificates, and Certificate Revocation Lists (CRLs) are as specified in o algorithm (an AlgorithmIdentifier type): The id-ecPublicKey OID MUST be used in the algorithm field, as specified in Section 2.1.1 of [RFC5480]. The value for the associated parameters MUST be secp256r1, as specified in Section 2.1.1.1 of [RFC5480].…”
Section: Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…The algorithms used to compute signatures on CA certificates, BGPsec Router Certificates, and Certificate Revocation Lists (CRLs) are as specified in o algorithm (an AlgorithmIdentifier type): The id-ecPublicKey OID MUST be used in the algorithm field, as specified in Section 2.1.1 of [RFC5480]. The value for the associated parameters MUST be secp256r1, as specified in Section 2.1.1.1 of [RFC5480].…”
Section: Algorithmsmentioning
confidence: 99%
“…The value for the associated parameters MUST be secp256r1, as specified in Section 2.1.1.1 of [RFC5480].…”
Section: Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…o that both certificates (the recipient's certificate and its own) contain public-key values with the same curve parameters, and o that both of these public-key values are marked as appropriate for ECDH (that is, marked with algorithm identifiers id-ecPublicKey or id-ecDH [RFC5480]). …”
Section: Actions Of the Sending Agentmentioning
confidence: 99%
“…In order to encourage interoperability, implementations SHOULD use the elliptic curve domain parameters specified by [RFC5480].…”
Section: Requirements and Recommendationsmentioning
confidence: 99%