I approve the change.

Deb

On Mon, Feb 23, 2026 at 3:23 PM Madison Church <[email protected]>
wrote:

> Hi Daniel, *Deb,
>
> Daniel - Thank you for your reply! We have updated the document
> accordingly.
>
> *Deb - As responsible AD, please let us know if you approve the correction
> in Section 2.4 (which can be viewed in this diff file:
> https://www.rfc-editor.org/authors/rfc9936-auth48diff.html).
>
> Authors - Please review the document carefully to ensure satisfaction as
> we do not make changes once it has been published as an RFC. Contact us
> with any further updates or with your approval of the document in its
> current form. We will await approvals from each author prior to moving
> forward in the publication process.
>
> Updated files have been posted here (please refresh):
>    https://www.rfc-editor.org/authors/rfc9936.txt
>    https://www.rfc-editor.org/authors/rfc9936.pdf
>    https://www.rfc-editor.org/authors/rfc9936.html
>    https://www.rfc-editor.org/authors/rfc9936.xml
>
> Updated diff files:
>    https://www.rfc-editor.org/authors/rfc9936-diff.html
>    https://www.rfc-editor.org/authors/rfc9936-rfcdiff.html (side by side)
>    https://www.rfc-editor.org/authors/rfc9936-auth48diff.html
>    https://www.rfc-editor.org/authors/rfc9936-auth48rfcdiff.html (side by
> side)
>
> AUTH48 status page: https://www.rfc-editor.org/auth48/rfc9936
>
> Thank you!
>
> Madison Church
> RFC Production Center
>
> > On Feb 23, 2026, at 5:06 AM, Daniel Van Geest <
> [email protected]> wrote:
> >
> > Hi Madison and all,
> >
> > I have just discovered an error in draft-ietf-lamps-cms-kyber-13.
> >
> > The wrong content type was mentioned in section 2.4.  The correct
> content types are mentioned throughout the rest of the document, so this
> section should be corrected to align with the rest of the document.
> >
> > OLD:
> >
> >    Section 2.5.2 of [RFC8551] defines the SMIMECapabilities attribute to
> >    announce a partial list of algorithms that an S/MIME implementation
> >    can support.  When constructing a CMS signed-data content type
> >    [RFC5652], a compliant implementation MAY include the
> >    SMIMECapabilities attribute that announces support for one or more of
> >    the ML-KEM algorithm identifiers.
> >
> > NEW:
> >
> >    Section 2.5.2 of [RFC8551] defines the SMIMECapabilities attribute to
> >    announce a partial list of algorithms that an S/MIME implementation
> >    can support.  When constructing a CMS enveloped-data content type, a
> >    CMS authenticated-data content type, or a CMS authenticated-
> >    enveloped-data content type, a compliant implementation MAY include
> >    the SMIMECapabilities attribute that announces support for one or
> >    more of the ML-KEM algorithm identifiers.
> >
> > Thanks,
> > Daniel
> >
> > From: Madison Church <[email protected]>
> > Sent: Thursday, February 19, 2026 9:35 PM
> > To: Daniel Van Geest <[email protected]>; Julien
> Prat <[email protected]>; [email protected] <
> [email protected]>
> > Cc: [email protected] <[email protected]>;
> [email protected] <[email protected]>; [email protected] <
> [email protected]>; [email protected] <[email protected]>;
> [email protected]<[email protected]>; [email protected] <
> [email protected]>
> > Subject: Re: AUTH48: RFC-to-be 9936 <draft-ietf-lamps-cms-kyber-13> for
> your review
> >
> > Hi Daniel,
> >
> > Thank you for your response! We have updated the document per your reply
> and we have no followup questions at this time. Once we have all author
> approvals for this document (and once RFC-to-be 9935 completes AUTH48), we
> will move this document forward in the publication process.
> >
> > The updated files have been posted here (please refresh):
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.txt&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106424033%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=eBOlZz5DecuadtcDGTOYApppdecjrr5JVLm82BtKBGI%3D&reserved=0
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.pdf&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106437215%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=hRurVTAIr6FWXpkweLrx7GTtApkCmcRP7m2PABtZD7k%3D&reserved=0
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106445354%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=TiK1grHP1%2FoMoH3FLr0FF4AkHDWzE%2FU4vN5A1%2F4pNgg%3D&reserved=0
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.xml&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106452931%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=7mAnGWnx7zWJwh8FVxeQ8Bu4jmyIXRMhaVBs60MSwoY%3D&reserved=0
> >
> > Diff files:
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-diff.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106460489%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=EdAVvywiXMJ89K2tV1zeSMhUXSRt9Y94uaOAtYij0Q8%3D&reserved=0
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-rfcdiff.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106467806%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=DUqrVAvwXY2C3JqySKfSM9mwKmTQsBmxAWlhv%2BOUvjk%3D&reserved=0
> (side by side)
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48diff.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106474936%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=P1xUZ7nUee0HsFtCI0vAw4MaZveAGuRxCpljRQhB5hQ%3D&reserved=0
> >
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48rfcdiff.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106482314%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=lU88DIvaAUx1%2FhjL1P9PRQ8F%2BVdgUm4jMgSx1UdwaIk%3D&reserved=0
> (side by side)
> >
> > For the AUTH48 status page, see:
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106489489%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=q%2Fxr3C3qzMBsRbnmuY4MbiHWuy6H7g0KJEa1%2FbzxxWk%3D&reserved=0
> .
> >
> > Thank you!
> > Madison Church
> > RFC Production Center
> >
> > > On Feb 16, 2026, at 7:40 AM, Daniel Van Geest <daniel.vangeest=
> [email protected]> wrote:
> > >
> > > Responses inline
> > > On 2026-02-10 5:02 a.m., [email protected] wrote:
> > >> Authors,
> > >>
> > >> While reviewing this document during AUTH48, please resolve (as
> necessary)
> > >> the following questions, which are also in the source file.
> > >>
> > >> 1) <!-- [rfced] FYI: We have updated "Module Lattice Key Encapsulation
> > >> Mechanism" to "Module-Lattice-Based Key-Encapsulation Mechanism" to
> match
> > >> its use in NIST FIPS 203 and draft-ietf-lamps-kyber-certificates (and
> for
> > >> consistency with the Abstract). Please let us know any objections.
> > >>
> > >> Original:
> > >> The Module Lattice Key Encapsulation Mechanism (ML-KEM) is an
> > >> IND-CCA2-secure Key Encapsulation Mechanism (KEM) standardized in
> > >> [FIPS203] by the NIST PQC Project [NIST-PQ].
> > >>
> > >> Current:
> > >> The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is an
> > >> IND-CCA2-secure Key Encapsulation Mechanism (KEM) standardized in
> > >> [FIPS203] by the NIST PQC Project [NIST-PQ].
> > >> -->
> > > Looks good
> > >>
> > >>
> > >>
> > >> 2) <!-- [rfced] FYI: We believe "MK-KEM-512" should be "ML-KEM-512".
> We
> > >> have corrected as follows.
> > >>
> > >> Original:
> > >> This document specifies the direct use of ML-KEM in the
> > >> KEMRecipientInfo structure using each of the three parameter sets from
> > >> [FIPS203], namely MK-KEM-512, ML-KEM-768, and ML-KEM-1024.
> > >>
> > >> Current:
> > >> This document specifies the direct use of ML-KEM
> > >> in the KEMRecipientInfo structure using each of the three parameter
> > >> sets from [FIPS203], namely ML-KEM-512, ML-KEM-768, and ML-KEM-1024.
> > >> -->
> > > Looks good
> > >>
> > >>
> > >> 3) <!-- [rfced] We have updated the following sentence since we fully
> > >> expanded HKDF. Please let us know any objections.
> > >>
> > >> Original:
> > >> Implementations MUST support HKDF [RFC5869] with SHA-256 [FIPS180],
> > >> using the id-alg-hkdf-with-sha256 KDF object identifier [RFC8619].
> > >>
> > >> Current:
> > >> Implementations MUST support the HMAC-based Key Derivation Function
> > >> (HKDF) [RFC5869] with SHA-256 [FIPS180] using the id- alg-hkdf-with-
> > >> sha256 KDF object identifier [RFC8619].
> > >> -->
> > > Looks good
> > >>
> > >>
> > >> 4) <!-- [rfced] References
> > >>
> > >> a) FYI: We updated the date for [CSOR] from "20 August 2024" to "13
> > >> June 2025" to match the most current date provided at the URL.
> > >>
> > >> Original:
> > >> [CSOR] NIST, "Computer Security Objects Register", 20 August
> > >> 2024, <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fcomputer-security-&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106496563%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=j0oIOwAywjcujHnfd9kQ0R0hC0iGNQMO5LxcRStcT2U%3D&reserved=0
> > >> objects-register/algorithm-registration>.
> > >>
> > >> Current:
> > >> [CSOR] NIST, "Computer Security Objects Register (CSOR)", 13 June
> > >> 2025, <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fcomputer-security-&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106503897%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=dlKhDFzQIxsMc1GOnS2orQB%2Bxk8WIx8okE1S%2B9JuBkI%3D&reserved=0
> > >> objects-register/algorithm-registration>.
> > > Looks good
> > >>
> > >> b) FYI: We've updated the date for [NIST-PQ] from "20 December 2016"
> to
> > >> "30 September 2025" to match the most current date provided at the
> URL.
> > >>
> > >> Original:
> > >> [NIST-PQ] National Institute of Standards and Technology, "Post-
> > >> Quantum Cryptography Project", 20 December 2016,
> > >> <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fpost-quantum-&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106511016%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=hEoXDrRB2HqN9LYXmE9Jh1xdI2IoooLfKwmn46XRJh0%3D&reserved=0
> > >> cryptography>.
> > >>
> > >> Current:
> > >> [NIST-PQ] NIST, "Post-Quantum Cryptography (PQC)", 30 September
> > >> 2025, <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fpost-quantum-&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106520455%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=wlxVxUeE2BVV5dfsFEhsd%2F3H3LFh1zpcXrosgg%2FOmZo%3D&reserved=0
> > >> cryptography>.
> > > Looks good
> > >>
> > >>
> > >> c) FYI: We've updated the date for [CMVP] from "2016" to "3 September
> > >> 2025" to match the most current date provided at the URL.
> > >>
> > >> Original:
> > >> [CMVP] National Institute of Standards and Technology,
> > >> "Cryptographic Module Validation Program", 2016,
> > >> <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fcryptographic-module-&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106530485%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=Oi3xC%2Bim0kp7FP42qDdSrZJNURBYCjgcYfiI25V5P5g%3D&reserved=0
> > >> validation-program>.
> > >>
> > >> Current:
> > >> [CMVP] NIST, "Cryptographic Module Validation Program (CMVP)", 3
> > >> September 2025, <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2F&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106538264%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=Saj%2BjG%2BptlkT4MQqSJIqr0amhsgygnzIrSUXZDpCJko%3D&reserved=0
> > >> cryptographic-module-validation-program>.
> > > Looks good
> > >>
> > >>
> > >> d) We note that draft-kampanakis-ml-kem-ikev2-09 has been replaced
> with
> > >> draft-ietf-ipsecme-ikev2-mlkem-03. We have updated the reference
> > >> accordingly. Please let us know if this is incorrect.
> > >> -->
> > > Looks good
> > >>
> > >>
> > >>
> > >> 5) <!-- [rfced] The following line exceeds the line limit by 3
> characters.
> > >> Please review and let us know how this line can be modified.
> > >>
> > >> 980 16: OCTET STRING 5C F1 78 6C 57 C7 40 2B 54 FC 93 C3 0A 4A 45 33
> > >>
> > >> -->
> > > The line can be wrapped.  I have re-run my dumpasn1 script with
> tighter wrapping. For consistency this causes all of the hex lines to be
> shifted left slightly. Here is the fully re-processed sample:
> > > NEW:
> > >      0 994: SEQUENCE {
> > >      4  11:  OBJECT IDENTIFIER
> > >           :   authEnvelopedData (1 2 840 113549 1 9 16 1 23)
> > >     17 977:  [0] {
> > >     21 973:   SEQUENCE {
> > >     25   1:    INTEGER 0
> > >     28 888:    SET {
> > >     32 884:     [4] {
> > >     36  11:      OBJECT IDENTIFIER '1 2 840 113549 1 9 16 13 3'
> > >     49 867:      SEQUENCE {
> > >     53   1:       INTEGER 0
> > >     56  20:       [0]
> > >           :    59 97 88 C3 7A ED 40 0E E4 05 D1 B2 A3 36 6A B1
> > >           :    7D 82 4A 51
> > >     78  11:       SEQUENCE {
> > >     80   9:        OBJECT IDENTIFIER '2 16 840 1 101 3 4 4 1'
> > >           :         }
> > >     91 768:       OCTET STRING
> > >           :    3E A4 0F C6 CA 09 0E 2C 8A F7 6E 27 27 AB 38 E0
> > >           :    65 2D 95 15 98 6F E1 86 82 7F E8 4E 59 6E 42 1B
> > >           :    85 FD 45 9C C7 89 97 37 2C 9D E3 1D 19 1B 39 C1
> > >           :    D5 A3 EB 6D DB 56 AA DE DE 76 5C C3 90 FD BB C2
> > >           :    F8 8C B1 75 68 1D 42 01 B8 1C CD FC B2 4F EF 13
> > >           :    AF 2F 5A 1A BC F8 D8 AF 38 4F 02 A0 10 A6 E9 19
> > >           :    F1 98 7A 5E 9B 1C 0E 2D 3F 07 F5 8A 9F A5 39 CE
> > >           :    86 CC 14 99 10 A1 69 2C 0C A4 CE 0E CE 4E EE D2
> > >           :    E6 69 9C B9 76 33 24 52 DE 4A 2E B5 CA 61 F7 B0
> > >           :    81 33 0C 34 79 8E F7 12 A2 4E 59 C3 3C EA 1F 1F
> > >           :    9E 6D 4F BF 37 43 A3 84 67 43 00 11 33 6F 62 D8
> > >           :    70 79 2B 86 6B EF CD 1D 1B 36 5B ED 19 52 67 3D
> > >           :    3A 5B 0C 20 B3 86 B4 EF D1 CF 63 FD 37 6B D4 7C
> > >           :    CC 46 AC 4D D8 EC 66 B0 47 C4 C9 5A CF F1 CF D0
> > >           :    28 A4 19 B0 02 FD A1 B6 17 CB A6 1D 2E 91 CF E8
> > >           :    FF FB CB 8F FD 4D 5F 6A D8 B1 58 C2 19 E3 6D C5
> > >           :    14 05 DC 0C 0B 23 49 79 AC 65 8E 72 BD DF 1B 67
> > >           :    73 B9 6B 2A E3 E4 D0 7B E8 60 48 04 0C 01 67 43
> > >           :    6F A8 39 E7 52 9B 00 CC 9A B5 5A 2F 25 DB 63 CC
> > >           :    9F 55 75 94 E6 91 C1 1E 55 3D 4A 3E BC 76 0F 5F
> > >           :    19 E5 FE 14 48 38 B4 C7 D1 59 1D A9 B5 D4 67 49
> > >           :    4F D9 CA C5 2C C5 50 40 60 39 9D BD B7 22 98 EB
> > >           :    9A 4C 01 7B 00 78 6F DC 7D 9D 7A A5 7A DB B8 B6
> > >           :    1C 34 DE 1E 28 8B 2A B7 28 17 1D CE 14 3C D1 69
> > >           :    53 F9 84 C1 AE D5 59 E5 6B AA 0C E6 58 D3 2C CE
> > >           :    42 F4 40 75 04 CD 7A 57 9A D0 EF 9B 77 13 5E AA
> > >           :    39 B6 F9 3A 3A 2E 59 97 80 7F 06 36 1C 83 F4 E6
> > >           :    7F 8E 3F 9C F6 83 16 01 15 14 F5 D8 5A 18 1C EA
> > >           :    D7 14 CD 49 40 E4 EB AC 01 D6 65 28 DA 32 F8 9C
> > >           :    EA 04 28 E8 EB CA DC F8 AA 18 8C 9F 62 E8 5B 19
> > >           :    57 65 5B 7F E2 B8 D7 97 3B 7A 72 26 B6 6D 93 BF
> > >           :    7B 23 2F 3D CF 65 3C 84 B4 EC F1 A9 92 0D B1 94
> > >           :    9A D7 50 B5 46 A5 55 2A 20 E5 49 09 71 9B 8C 0C
> > >           :    07 05 6F CB 7E 57 4A D2 A3 2E C9 50 01 DD E8 44
> > >           :    81 BE 77 D0 39 ED 5B F7 42 62 EC F3 98 1F 1B 00
> > >           :    D3 36 6A 9C 2E 06 1C 47 E2 41 A0 61 C6 24 95 60
> > >           :    D2 B8 44 6A 48 0C 38 C2 8B A9 89 D9 F6 8A DC 4B
> > >           :    BA F2 A2 0B 47 E4 92 31 28 C7 23 42 D5 97 FD A2
> > >           :    59 DE 0B 83 C2 05 6D 6B 77 E7 99 B3 19 32 4A A5
> > >           :    0B 1D 65 9C 2A 56 02 9B 74 53 C5 F3 BA 52 43 D9
> > >           :    FA 74 9D 91 7C 40 D9 D1 01 E4 53 BC 8B 10 E4 2A
> > >           :    7C 08 93 23 C0 26 F7 83 E1 00 B9 FA 6E 70 14 42
> > >           :    4D A6 FA 37 92 BC 95 7E E8 21 9D 01 6B 77 3F 28
> > >           :    FE DC C9 62 A4 85 AB AF FE C0 23 28 19 71 E2 9A
> > >           :    A6 89 83 9E CF D2 61 9E 92 28 7C D2 30 DB 26 A2
> > >           :    50 7C C5 00 EB 1C 7A 52 93 B5 FE 91 7A E2 9B F1
> > >           :    AD 35 01 24 F8 A3 11 63 52 14 B4 11 DB 9F 67 D3
> > >           :    B8 5B D7 15 01 85 37 EA 45 B4 1F 41 B4 C6 60 51
> > >    863  13:       SEQUENCE {
> > >    865  11:        OBJECT IDENTIFIER
> > >           :         hkdfWithSha256 (1 2 840 113549 1 9 16 3 28)
> > >           :         }
> > >    878   1:       INTEGER 16
> > >    881  11:       SEQUENCE {
> > >    883   9:        OBJECT IDENTIFIER
> > >           :         aes128-wrap (2 16 840 1 101 3 4 1 5)
> > >           :         }
> > >    894  24:       OCTET STRING
> > >           :    C0 50 E4 39 2F 9C 14 DD 0A C2 22 02 03 F3 17 D7
> > >           :    01 F9 4F 9D D9 27 78 F5
> > >           :        }
> > >           :       }
> > >           :      }
> > >    920  58:    SEQUENCE {
> > >    922   9:     OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
> > >    933  30:     SEQUENCE {
> > >    935   9:      OBJECT IDENTIFIER
> > >           :       aes128-GCM (2 16 840 1 101 3 4 1 6)
> > >    946  17:      SEQUENCE {
> > >    948  12:       OCTET STRING 5C A5 74 68 B8 1B F0 3B 8D A7 18 6C
> > >    962   1:       INTEGER 16
> > >           :        }
> > >           :       }
> > >    965  13:     [0] 94 C8 68 9A 99 D2 C3 8E 19 2F A6 BA 08
> > >           :      }
> > >    980  16:    OCTET STRING
> > >           :    5C F1 78 6C 57 C7 40 2B 54 FC 93 C3 0A 4A 45 33
> > >           :     }
> > >           :    }
> > >           :   }
> > >
> > >>
> > >> 6) <!-- [rfced] The following was provided in response to the intake
> form:
> > >>
> > >> Acknowledgements should maybe mention
> draft-ietf-lamps-kyber-certificates.
> > >> There is an Informative reference to I-D.kampanakis-ml-kem-ikev2
> which is only referenced from the Acknowledgements section. That s polite,
> but if this RFC will be delayed waiting for the other one, then it can be
> removed.
> > >>
> > >> Please provide text if you would like to update the Acknowledgements
> > >> section. Note that draft-ietf-lamps-kyber-certificates is now in
> AUTH48 as
> > >> RFC-to-be 9935.
> > >> -->
> > > The first paragraph of the acknowledgements section can be updated as
> follows to mention RFC9935.  As this is just an acknowledgement, I don't
> think draft would be delayed waiting on kampanakis-ml-kem-ikev2.  If that's
> the case, we can change the text further.
> > > NEW:
> > >    This document borrows heavily from [RFC9690], [FIPS203], [RFC9935],
> > >    and [I-D.ietf-ipsecme-ikev2-mlkem].  Thanks go to the authors of
> > >    those documents.  "Copying always makes things easier and less error
> > >    prone" - RFC8411.
> > >>
> > >> 7) <!-- [rfced] FYI - We updated artwork elements to sourcecode per
> the
> > >> guidance given in the document intake form:
> > >>
> > >> "...the two-line code block in section 2.2.1, the identifiers in
> section 3
> > >> and especially the sample data in Appendix C."
> > >>
> > >> A) Please review and let us know if any other artwork elements need
> to be
> > >> marked as sourcecode.
> > > No additional artworks need to be marked as sourcecode.
> > >>
> > >> B) Please review the current list of preferred values for sourcecode
> "type"
> > >> (
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frpc%2Fwiki%2Fdoku.php%3Fid%3Dsourcecode-types&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106546142%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=B7esviotwtVEiE%2BaST8hk0a9ZNkTnDZibBAMG4tRpnw%3D&reserved=0
> )
> > >> and let us know how/if type should be set. If the list does not
> contain an
> > >> applicable type, then feel free to let us know. Also, note that it is
> > >> acceptable to leave the "type" attribute not set.
> > >> -->
> > > These are the appropriate types:
> > > Section 2.2.1: pseudocode
> > > Section 3: asn.1
> > > Appendix C: test-vectors
> > >>
> > >> 8) <!-- [rfced] We have added expansions for abbreviations throughout
> the
> > >> document and use abbreviated forms for expansions upon first use.
> Please
> > >> let us know any objections.
> > >> -->
> > > Looks good
> > >>
> > >>
> > >> 9) <!-- [rfced] Please review the "Inclusive Language" portion of the
> > >> online Style Guide <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fstyleguide%2Fpart2%2F%23inclusive_language&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106553707%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=eXfKeR9EHNhiLCVIEVmodDXjup6RS6JyAOjaBDq39t8%3D&reserved=0
> >
> > >> and let us know if any changes are needed. Updates of this nature
> > >> typically result in more precise language, which is helpful for
> readers.
> > >>
> > >> Note that our script did not flag any words in particular, but this
> should
> > >> still be reviewed as a best practice.
> > >>
> > >> In addition, please consider whether "tradition" should be updated for
> > >> clarity. While the NIST website
> > >> <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fweb.archive.org%2Fweb%2F20250214092458%2Fhttps%3A%2F%2Fwww.nist.gov%2Fnist-research-library%2Fnist-technical-series-publications-author-instructions%23table1&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106561467%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=ZqPGwOVSRNfmny4kF8nChfSblT%2Btoaxx3oGzQ1tQSjY%3D&reserved=0
> >
> > >> indicates that this term is potentially biased, it is also ambiguous.
> > >> "Tradition" is a subjective term, as it is not the same for everyone.
> > >> Possible substitutions for "traditional" (used in past RFCs) include
> > >> "commonly used", "typical", "long-established", "conventional", and
> > >> "time-honored". -->
> > > This question can be sidestepped by removing "traditional" entirely:
> > > OLD:
> > >    Instead of defining the strength of a quantum algorithm in a
> > >    traditional manner using the imprecise notion of bits of security,
> > > NEW:
> > >    Instead of defining the strength of a quantum algorithm using the
> > >    imprecise notion of bits of security,
> > >>
> > >> Thank you.
> > >> Madison Church and Sandy Ginoza
> > >> RFC Production Center
> > > Thanks,
> > > Daniel
> > >>
> > >>
> > >> On Feb 9, 2026, at 8:59 PM, [email protected] wrote:
> > >>
> > >> *****IMPORTANT*****
> > >>
> > >> Updated 2026/02/09
> > >>
> > >> RFC Author(s):
> > >> --------------
> > >>
> > >> Instructions for Completing AUTH48
> > >>
> > >> Your document has now entered AUTH48. Once it has been reviewed and
> > >> approved by you and all coauthors, it will be published as an RFC.
> > >> If an author is no longer available, there are several remedies
> > >> available as listed in the FAQ (
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Ffaq%2F&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106568937%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=%2F65kEXn39JX84rBXeyr0Yf0PR%2FPWT2BQTzacIh%2BUrFo%3D&reserved=0
> ).
> > >>
> > >> You and you coauthors are responsible for engaging other parties
> > >> (e.g., Contributors or Working Group) as necessary before providing
> > >> your approval.
> > >>
> > >> Planning your review
> > >> ---------------------
> > >>
> > >> Please review the following aspects of your document:
> > >>
> > >> * RFC Editor questions
> > >>
> > >> Please review and resolve any questions raised by the RFC Editor
> > >> that have been included in the XML file as comments marked as
> > >> follows:
> > >>
> > >> <!-- [rfced] ... -->
> > >>
> > >> These questions will also be sent in a subsequent email.
> > >>
> > >> * Changes submitted by coauthors
> > >>
> > >> Please ensure that you review any changes submitted by your
> > >> coauthors. We assume that if you do not speak up that you
> > >> agree to changes submitted by your coauthors.
> > >>
> > >> * Content
> > >>
> > >> Please review the full content of the document, as this cannot
> > >> change once the RFC is published. Please pay particular attention to:
> > >> - IANA considerations updates (if applicable)
> > >> - contact information
> > >> - references
> > >>
> > >> * Copyright notices and legends
> > >>
> > >> Please review the copyright notice and legends as defined in
> > >> RFC 5378 and the Trust Legal Provisions
> > >> (TLP –
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftrustee.ietf.org%2Flicense-info&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106576216%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=YrcK36jLws5oU5hUUEPxWysuH6sIUc9epcMyG5X5gNY%3D&reserved=0
> ).
> > >>
> > >> * Semantic markup
> > >>
> > >> Please review the markup in the XML file to ensure that elements of
> > >> content are correctly tagged. For example, ensure that <sourcecode>
> > >> and <artwork> are set correctly. See details at
> > >> <
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fauthors.ietf.org%2Frfcxml-vocabulary&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106583578%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=MB6rFGcf%2FiK5nTgV9H6%2BlrhSRMIbD1BdVajKD8Z1tnA%3D&reserved=0
> >.
> > >>
> > >> * Formatted output
> > >>
> > >> Please review the PDF, HTML, and TXT files to ensure that the
> > >> formatted output, as generated from the markup in the XML file, is
> > >> reasonable. Please note that the TXT will have formatting
> > >> limitations compared to the PDF and HTML.
> > >>
> > >>
> > >> Submitting changes
> > >> ------------------
> > >>
> > >> To submit changes, please reply to this email using ‘REPLY ALL’ as all
> > >> the parties CCed on this message need to see your changes. The parties
> > >> include:
> > >>
> > >> * your coauthors
> > >>
> > >> * [email protected] (the RPC team)
> > >>
> > >> * other document participants, depending on the stream (e.g.,
> > >> IETF Stream participants are your working group chairs, the
> > >> responsible ADs, and the document shepherd).
> > >>
> > >> * [email protected], which is a new archival mailing list
> > >> to preserve AUTH48 conversations; it is not an active discussion
> > >> list:
> > >>
> > >> * More info:
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fietf-announce%2Fyb6lpIGh-4Q9l2USxIAe6P8O4Zc&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106591115%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=50Iz6uxJrJRww7Qq2ZwDc8kGhZBgp17grg1zr0JQ0Vw%3D&reserved=0
> > >>
> > >> * The archive itself:
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fbrowse%2Fauth48archive%2F&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106598660%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=Q9ctvgxbwVVM%2BbvOTNf2fUQiZypIlPnv%2BMdB2b%2Bn%2BnI%3D&reserved=0
> > >>
> > >> * Note: If only absolutely necessary, you may temporarily opt out
> > >> of the archiving of messages (e.g., to discuss a sensitive matter).
> > >> If needed, please add a note at the top of the message that you
> > >> have dropped the address. When the discussion is concluded,
> > >> [email protected] will be re-added to the CC list and
> > >> its addition will be noted at the top of the message.
> > >>
> > >> You may submit your changes in one of two ways:
> > >>
> > >> An update to the provided XML file
> > >> — OR —
> > >> An explicit list of changes in this format
> > >>
> > >> Section # (or indicate Global)
> > >>
> > >> OLD:
> > >> old text
> > >>
> > >> NEW:
> > >> new text
> > >>
> > >> You do not need to reply with both an updated XML file and an explicit
> > >> list of changes, as either form is sufficient.
> > >>
> > >> We will ask a stream manager to review and approve any changes that
> seem
> > >> beyond editorial in nature, e.g., addition of new text, deletion of
> text,
> > >> and technical changes. Information about stream managers can be found
> in
> > >> the FAQ. Editorial changes do not require approval from a stream
> manager.
> > >>
> > >>
> > >> Approving for publication
> > >> --------------------------
> > >>
> > >> To approve your RFC for publication, please reply to this email
> stating
> > >> that you approve this RFC for publication. Please use ‘REPLY ALL’,
> > >> as all the parties CCed on this message need to see your approval.
> > >>
> > >>
> > >> Files
> > >> -----
> > >>
> > >> The files are available here:
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.xml&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106606068%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=p91a05OTMYaeVtHxc6ZeFY%2FN5w%2FR3C4wYgNjWjj2U84%3D&reserved=0
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106613275%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=leGz%2B2joSVQMl2FTEfkWxrBDKXChoDZJtzBeq4hnmJs%3D&reserved=0
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.pdf&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106620536%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=BPOOQsUBg%2BJknDUd4OrgFhYuIVct6ptMcS4v%2BbLhiuE%3D&reserved=0
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.txt&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106628047%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=%2FSEEPVrUH4T6qGeqdJnJq%2Fnnvxpj7v2cXhlNA2YZU8U%3D&reserved=0
> > >>
> > >> Diff file of the text:
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-diff.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106635476%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=Tcc%2BONTPmeuRPTGy1IXmRuaX1pAZkseym3DL2eK9sUY%3D&reserved=0
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-rfcdiff.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106642620%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=IclSgwXAjYJm1KJnSLQRkx7DVfUkNtc%2BhA1FjYCNXsY%3D&reserved=0
> (side by side)
> > >>
> > >> Diff of the XML:
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-xmldiff1.html&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106649867%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=HpAQbf%2F7ERt%2BGmex4WR1Azxc3wFs%2BubdIh2flXrAigI%3D&reserved=0
> > >>
> > >>
> > >> Tracking progress
> > >> -----------------
> > >>
> > >> The details of the AUTH48 status of your document are here:
> > >>
> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cdaniel.vangeest%40cryptonext-security.com%7C78cca519b7fe4ae0c6d608de6ffee9ca%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639071338106657036%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C60000%7C%7C%7C&sdata=hV4jt9f4eWj9LPnLgqb84B1UDpvbcT1GKAP3ndU41k4%3D&reserved=0
> > >>
> > >> Please let us know if you have any questions.
> > >>
> > >> Thank you for your cooperation,
> > >>
> > >> RFC Editor
> > >>
> > >> --------------------------------------
> > >> RFC 9936 (draft-ietf-lamps-cms-kyber-13)
> > >>
> > >> Title : Use of ML-KEM in the Cryptographic Message Syntax (CMS)
> > >> Author(s) : P. Julien, M. Ounsworth, D. Van Geest
> > >> WG Chair(s) : Russ Housley, Tim Hollebeek
> > >> Area Director(s) : Deb Cooley, Paul Wouters
>
>
>
-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to