[CFRG] Re: Request for adoption: Signature modes guidance / draft-harvey-cfrg-mtl-mode-03

"Kaliski, Burt" <bkaliski@verisign.com> Wed, 18 September 2024 14:20 UTC

Return-Path: <bkaliski@verisign.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 301EDC14EB1E for <cfrg@ietfa.amsl.com>; Wed, 18 Sep 2024 07:20:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=verisign.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lg7mAy2p_eM8 for <cfrg@ietfa.amsl.com>; Wed, 18 Sep 2024 07:20:33 -0700 (PDT)
Received: from mail4.verisign.com (mail4.verisign.com [69.58.187.30]) by ietfa.amsl.com (Postfix) with ESMTP id C6423C180B63 for <cfrg@irtf.org>; Wed, 18 Sep 2024 07:20:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=verisign.com; l=61692; q=dns/txt; s=VRSN; t=1726669233; h=from:to:cc:date:message-id:references:in-reply-to: mime-version:subject; bh=bvqRbS0NyrU3Gt4DryCoMRPV55FMAyRV6eQZuer6eHk=; b=PZv8ojxovDV+ajK4f45nNkU+sejGebjytAFEIWwFK6HlyNjaL72oyeIG 2a14DqqDSWHRolfYLm9xJMYH+kCasx543e9xSclWcCfVgfnuNRB1P2tmi xzNM54lscwhvWhRReMqd6ylgRqyqMnZ0bXuCKrpM/veU80J5noz2GwwM9 SvsqQ9qe5MWHxkFY2mBT2SKPEDDA/J1656KRp9rKuMeMFtnWAT6Vk7a+z gcomBXKBr26+3xY8b1RG5lyt4VtFfv7ZkKGBUwzi+UC5VHv5mCDxmiXj2 rH2/vHKvrHrxQHD5yd5TcR5oV2ReJQXExfs46n1bKDVbRxsp0NDEq35UL Q==;
X-CSE-ConnectionGUID: iRxU5q4RRZqCR/F0imuMcg==
X-CSE-MsgGUID: d4XylB8ATy+H6+g1ZJfKIQ==
X-ThreatScanner-Verdict: Negative
IronPort-Data: A9a23:LejrSq/PopPRKlGxmuguDrUDhX+TJUtcMsCJ2f8bNWPcYEJGY0x3y 2NMWWqDOv+JajSgc4hwPIm+80hQvZ+Dn4BkQQU4+HwxFiIbosf7XtnIdU2Y0wF+jCHgZBk+s 5hBMImowOQcFCK0SsKFa+C5xZVE/fjVAOe6UaicZ30ZqTZMEE8JkQhkl/MynrlmiN24BxLlk d7pqqUzAnf8s9JPGjxSsvrrRC9H5qyo5GtJ5wxmP5ingXeF/5UrJMNHTU2OByagKmVkNrbSb /rOyri/4lTY838FYvu5kqz2e1E9WbXbOw6DkBJ+A8BOVTAb+0Teeo5iXBYtQR8/Zwehxrid+ /0U3XCEcjrFC4WX8Agre0IBT3whZ/0uFIjvehBTueTLp6HPWyW0n6U2VCnaN6VAkgp8KTkmG fD1tFnhx/1M7g676OvTdwViuigsBMjRLL5Coy1a9wPAJsxhb8jCRrjv7tANiV/chugWdRrfT +s9RmNQSjnwO0QJJFwQEop4levumGPkdXtTr1f9SagfujCVllAvluGwapyPJ7RmRu0M9qqcj mjF9mD4GRIbHMKS0zue832qwOTImEsXXapJT+PiqaA72TV/wEQfVC0HUXHriMWoyW7gGN0GG W4a2QsX+P1aGEuDC4OVsweDiHWKpBE0WsBMHas98g7l4rLU4gKdLmgNSjpIbdYvt8IsAzct0 ze0c8jBBDhg6aKTRGLFr/KPsyn0PCkOaGUFIy4AQlJD/cP4psc4iRenostfLZNZR+bdQVnYq w1mZgBn71nPpabnD5mGwG0=
IronPort-HdrOrdr: A9a23:Y5jgOaA+j/vlIVTlHelx55DYdb4zR+YMi2TDsHoBLCC9E/bo9f xG88566faZslgssRIb9uxoUZPoKU80nqQFgrX5U43CYCDW/EWlK4145ZbvznnKC0TFmtJ15O NFf7JlANP9SXp3na/BijWQIpIFzMOc+K6lwd3CyWxgJDsGV4h74xxnBh2gHkp6eQlDCfMCf6 ah2g==
X-Talos-CUID: 9a23:aoKlqmPxqAuV1O5DWRN3yRMNRvofQGT29jD+e069FENiR+jA
X-Talos-MUID: 9a23:Hs7KjwSzWG9cNZ5ERXTg2AFzMO04ypi/S2BT0ppfieuKFg1JbmI=
X-IronPort-AV: E=Sophos;i="6.10,239,1719878400"; d="scan'208,217";a="33627691"
Received: from ILG1WNEX01.vcorp.ad.vrsn.com (10.246.152.25) by ILG1WNEX01.vcorp.ad.vrsn.com (10.246.152.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.37; Wed, 18 Sep 2024 10:20:31 -0400
Received: from ILG1WNEX01.vcorp.ad.vrsn.com ([10.246.152.25]) by ILG1WNEX01.vcorp.ad.vrsn.com ([10.246.152.25]) with mapi id 15.01.2507.037; Wed, 18 Sep 2024 10:20:31 -0400
From: "Kaliski, Burt" <bkaliski@verisign.com>
To: "cfrg@irtf.org" <cfrg@irtf.org>
Thread-Topic: [EXTERNAL] Re: [CFRG] Re: Request for adoption: Signature modes guidance / draft-harvey-cfrg-mtl-mode-03
Thread-Index: AQHbA0Ce4QM5ZGP0OECC+kr+PbE3kbJdnDnQ
Date: Wed, 18 Sep 2024 14:20:31 +0000
Message-ID: <e6b5c46f7c3149c9b67262d60c75a572@verisign.com>
References: <43f8434f68c144f38b4a4a3933841899@verisign.com> <1303edf5a027444ca135ba36a579e186@verisign.com> <CAMm+LwhYqnGUarOZZsSfDM=tazG23qvgnvg2mF1J-n90nABHfA@mail.gmail.com>
In-Reply-To: <CAMm+LwhYqnGUarOZZsSfDM=tazG23qvgnvg2mF1J-n90nABHfA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.170.148.18]
Content-Type: multipart/alternative; boundary="_000_e6b5c46f7c3149c9b67262d60c75a572verisigncom_"
MIME-Version: 1.0
Message-ID-Hash: XE4ZXVFU37MUK3TTXQAEF7FEYD7BS7AB
X-Message-ID-Hash: XE4ZXVFU37MUK3TTXQAEF7FEYD7BS7AB
X-MailFrom: bkaliski@verisign.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-cfrg.irtf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [CFRG] Re: Request for adoption: Signature modes guidance / draft-harvey-cfrg-mtl-mode-03
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/DVQ5Uc7sHT4D0VwnQCMTzjImm4Y>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Owner: <mailto:cfrg-owner@irtf.org>
List-Post: <mailto:cfrg@irtf.org>
List-Subscribe: <mailto:cfrg-join@irtf.org>
List-Unsubscribe: <mailto:cfrg-leave@irtf.org>

Thanks very much for your support, Phill.



As I’ve noted in my previous emails, there are two aspects where CFRG consideration of the draft would be helpful:  (1) guidance on signature modes in general; and (2) the specification of MTL mode in particular.  Phill has enumerated some of the “questions of crypto” that would be involved.



In an addition to my emails to CFRG, I also emailed LAMPS with related questions [1] about signature modes of operation in draft-ietf-lamps-pq-composite-sigs [2].  Mike Ounsworth added my questions to the issues list [3].  Similar questions could be raised with respect to signature modes in other drafts and working groups, hence my interest in a broader discussion within CFRG.



The MTL mode draft was updated this week [4] to align with FIPS 205 (the changes were minor).  In addition, we also recently published design considerations for integrating Merkle Tree Ladder (MTL) Mode signatures into applications [5].



-- Burt

[1] https://mailarchive.ietf.org/arch/msg/spasm/vzomXUHvJOouzIcC82WkMF4DP-g/

[2] https://datatracker.ietf.org/doc/draft-ietf-lamps-pq-composite-sigs/

[3] https://mailarchive.ietf.org/arch/msg/spasm/Xq6PkGkXX4SXudJUnqkVtJ0Mu-U/

[4] https://datatracker.ietf.org/doc/draft-harvey-cfrg-mtl-mode/

[5] https://datatracker.ietf.org/doc/draft-harvey-cfrg-mtl-mode-considerations/







From: Phillip Hallam-Baker <phill@hallambaker.com>
Sent: Tuesday, September 10, 2024 1:16 AM
To: Kaliski, Burt <bkaliski@verisign.com>
Cc: cfrg@irtf.org
Subject: [EXTERNAL] Re: [CFRG] Re: Request for adoption: Signature modes guidance / draft-harvey-cfrg-mtl-mode-03



Caution: This email originated from outside the organization. Do not click links or open attachments unless you recognize the sender and know the content is safe.

I support this work having worked on developing similar structures for the purpose of validating notary entries.



From an implementation point of view, it fits in the signature slot.



There are actually quite a few degrees of freedom here and implementation actually requires rather a lot of thought. Working out how to balance the tree is one thing, gathering up the minimum necessary data to create a proof is another.



Sure, it all looks easy *after the code is written* but so did Diffie Hellman and Martin Hellman reports that it actually took him quite a while puzzling over how to put the things together because what seems obvious once you see the answer is not when you are trying to find it.



And there are real questions of crypto here. For example, what hash size do we need for a given work factor? Digests typically require double the bit size on account of the birthday thing. But is that the case here? Can we get a work factor of 2^256 with 256 bit digests? That halves the size of the tree at a stroke.





Right now I am using binary trees but that has the problem that 32*log2(bignumber) gets big fast. So I have been playing with increasing the degree of the graph as it expands. So you start off with binary, shift to order 3, shift up to 4, 5, etc. as the log expands so that you get a tradeoff between the node size and path length.









On Fri, Aug 9, 2024 at 11:23 AM Kaliski, Burt <bkaliski=40verisign.com@dmarc.ietf.org<mailto:40verisign.com@dmarc.ietf.org>> wrote:

   Thanks all for the thoughtful feedback to my request.

   I've included responses to the technical comments below.

   Note that although draft-harvey-cfrg-mtl-mode-03 is the document under discussion, the proposal I'm making is broader. I am asking that CFRG provide guidance to protocol designers on signature modes of operation more generally.  In particular, how to combine hash functions and other techniques with an underlying signature algorithm to obtain additional security and operational properties.

   > [Watson Ladd] I don't understand why this is in the CFRG: it seems to be squarely in the line of decisions WGs have made outside CFRG such as keytrans or CT.

   WGs have made decisions on using pre-hashing and Merkle tree constructions in various ways, and they could continue to do so for MTL mode and other techniques. However, while WGs may have built on one another's experiences in deciding on their cryptographic constructions, the specifications of these constructions have generally been made within the applications themselves.

   Having common specifications for these kinds of constructions would be helpful not only for interoperability but also for addressing security questions such as:

   (a) which hash functions to use in combination with particular signature algorithms (discussions along these lines are underway in LAMPS for composite signatures);
   (b) how to handle the case that an application uses the same key pair in two different modes (e.g. "pure" and "pre-hashing" -- should there be a "domain separator");
   (c) whether and when to include other inputs to the hash functions (randomizer, public key, etc.) to achieve additional security properties;
   (d) how to model interactions between the use of hash and other functions in the construction, and in the underlying signature algorithms, as they mayaffect security proofs.

   Questions like these are more squarely in the line of CFRG than in the WGs integrating the constructions into their applications.

   > [Watson Ladd] Separately while I think the idea is interesting, there's a lot of operational and structural questions to actually apply it very closely ingrained with application and protocol level considerations. CFRG isn't really suited to determine if this will work. This is not to say it shouldn't be pursued, but I just have a lot of questions about how it would work fro DNSSEC for instance.

   Agreed. We expect that specifications for integrating MTL mode into a given application, e.g., DNSSEC (see draft-fregly-dnsop-slh-dsa-mtl-dnssec-02) will give further detail specific to the application. The focus for CFRG would be the cryptographic constructions.

   > [Richard Barnes] I tend to agree with Watson here. It's not clear to me why this is a new signing mode vs. just another data structure that gets signed.  Plenty of other signed hash-based data structures have been defined by Certificate Transparency, the various flavors of Key Transparency, and others. As Watson says, and as these examples illustrate, the details of these data structures tend to be pretty application-specific. So it seems like this work might be better done in a venue with more DNSSEC expertise, even if it might be reusable elsewhere.

   As noted, the focus for CFRG would be on the cryptographic constructions. These reusable parts would benefit from CFRG expertise on the state of the art in cryptographic design. For example, draft-harvey-cfrg-mtl-mode-03 adopts techniques from SPHINCS+ to reduce the size of the internal hash values and to move to security properties such as multi-function, multi-target second-preimage resistance. These kinds of changes are much more within CFRG expertise than DNSSEC.

   > [Mike Ounsworth] But CT doesn't externalize data needed to validate the signature into the CT data. I think that's what makes it a "signature mode" rather than a "protocol".

   > I also think that the authors are trying to get cryptographic review of the crypto and show that this mode could be used beyond DNSSEC, hence bringing it to CFRG.

   Yes, in MTL mode, signatures can be distributed in two parts, a short "condensed signature" for a specific message, and a longer "signed ladder" that can authenticate multiple messages. The two parts of the signature for a given message can also vary over time as additional messages are signed. We see this approach as a signature mode because the parts are cryptographic constructions and agree that it could be used beyond DNSSEC.

   -- Burt

   (Note:  Reference [10] in my initial email refers to draft-ietf-lamps-pq-composite-kem-04.  It should have referred to draft-ietf-lamps-pq-composite-sigs-02.)


   -----Original Message-----
   From: Kaliski, Burt
   Sent: Monday, August 5, 2024 9:43 AM
   To: 'cfrg@irtf.org<mailto:cfrg@irtf.org>' <cfrg@irtf.org<mailto:cfrg@irtf.org>>
   Cc: Fregly, Andrew <afregly@verisign.com<mailto:afregly@verisign.com>>; Harvey, Joseph
   <jsharvey@verisign.com<mailto:jsharvey@verisign.com>>; Sheth, Swapneel <ssheth@verisign.com<mailto:ssheth@verisign.com>>
   Subject: Request for adoption: Signature modes guidance /
   draft-harvey-cfrg-mtl-mode-03

   CFRG,

   Following up on my presentation at IETF 120, I would like to request that
   CFRG adopt draft-harvey-cfrg-mtl-mode-03 [1] as part of a broader research
   effort to provide guidance on modes of operation for digital signature
   schemes in applications.  The authors' rationale is as follows:

   * NIST is in the process of standardizing what are effectively two modes of
   operation for FIPS 204 and 205 - "pure signing" where the message is signed
   directly with the underlying signature scheme and "pre-hash signing" where
   the hash of the message is signed.  NIST has also introduced a "domain
   separator" format to distinguish the two modes [2].
   (draft-harvey-cfrg-mtl-mode-03 adopts the domain separator format to
   distinguish MTL mode from others.)

   * There are discussions underway on these topics on NIST's pqc-forum mailing
   list [3].  It seems prudent that CFRG advance guidance to applications on
   how and when to use pure signing vs. pre-hash signing, how to use domain
   separators and context strings in inputs to signature schemes, and how to
   approach other modes of operation.

   * The initial use case for MTL mode is DNSSEC, as described in
   draft-fregly-dnsop-slh-dsa-mtl-dnssec-02 [4].  The current draft includes an
   example zone file signed with SPHINCS+ (SLH-DSA) in MTL mode.  The authors
   hosted a hackathon session [5] on the draft at IETF 120 and also presented
   [6] at HotRFC.  In addition, following the PQ DNSSEC side meeting [7], a new
   non-WG mailing list, pq-dnssec [8], was formed in the Security Area.  The
   mailing list will be used for discussions of
   draft-fregly-research-agenda-for-pqc-dnssec-01 [9].  MTL mode is one of
   several approaches for reducing the operational impact of post-quantum
   signatures identified in the draft.

   * Another example of a signature mode where CFRG guidance would be helpful
   is composite signatures [10].  For instance, if the composite signature
   construction is applied to FIPS 204/205, does this mean that FIPS 204/205 is
   operated in "pure" mode (because the pre-hashing has already been done)?
   And how should an application use the optional context string provided by
   FIPS 204/205 in a composite construction?

   * Verisign announced a public, royalty-free license to certain intellectual
   property related to draft-harvey-cfrg-mtl-mode-03.  IPR declarations
   6174-6176 [11] give the official language.

   Thanks -- Burt

   [1] J. Harvey, B. Kaliski, A. Fregly, S. Sheth.  Merkle Tree Ladder (MTL)
   Mode Signatures.  draft-harvey-cfrg-mtl-mode-03, June 12, 2024,
   https://datatracker.ietf.org/doc/draft-harvey-cfrg-mtl-mode/03/<https://secure-web.cisco.com/1d4-qYj01_2aEClhnq-gkCWrwp76cXNq5vtNdEYffGieqYxp3MbqS_wDNFwAf6260jKu663MZAlHpQmTjmOExMx0vcWGx6oAh-2Mo1b79B-7qPhL5Mgznnl64_GFKqLHtnhd05sECLMQXKB_QsKAFHXy-og43avdeQYgaKvfDha80BXeJerND_5R7gef86eJRcIhit1FaTV3HFLWd6BAR4eQ8Mi3Ucn73uqbY8cj2upYiFadobObLMdaFyQSGZRod6RrzEmRlsVnwoRmT_3vh4UDtIa51V9cDe1nIxYLg4Ak/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-harvey-cfrg-mtl-mode%2F03%2F>
   [2] D. Moody. Updates on pre-hash for FIPS 204 and 205.
   pqc-forum@list.nist.gov<mailto:pqc-forum@list.nist.gov> mailing list, April 19, 2024,
   https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/JKMh0D0pa30/m/vbflXo<https://secure-web.cisco.com/18xmBY03DFm0s3hPhlUVcz6qFKWrbe9oMzaM4x96n0UqrO593MlkKusXtkAWLACdX_Hy8Wo8bjpDlL50NRE4RqPvuZ1oTAwA5NaBPeeI352BLrFC5zRVXNKcS6Q31JG_u4wXqxmrsJIjWERQsRjDeVfg0qmuCrJvTTtNK3xA1qVAWhGUB0ZbknCl5jOkeaeHpK1q2lk06E7t2GI_2erzjBra3nfV01Toi9uOJZtZvtBybI2x4_SQolFw_oN2OZPk4ZC3TPxs0uQHMPRt-N_8XGeZW6fXQj3wDJ7lAgqYT_qk/https%3A%2F%2Fgroups.google.com%2Fa%2Flist.nist.gov%2Fg%2Fpqc-forum%2Fc%2FJKMh0D0pa30%2Fm%2FvbflXo>
   lxAQAJ.
   [3] pqc-forum mailing list,
   https://groups.google.com/a/list.nist.gov/g/pqc-forum<https://secure-web.cisco.com/1oTBi10uimVxvWdXt5M2MDFLG9ah0UCgUnm1KqGrp7MkzbLNli_lypsKWpWH4NChQ6a-tbsLP7BldmdqP3uxiqHVA5K4WulwZ8Xo_SwV9sQ8w8Pv2wRxQ2854OV1dephE74b0j3yf98FbvN3IMmidB3ZLWNFyC1rqPyaiMTjzeQ5LD0xfXoHRjRcttdagenan_XGaLxkb_i35K4LN5d_3Q1Ycj37Wk6c1jahC9JGZCXzVR3JCRAUeNKli4_xHRM3g9YUaJ94DKaGrP_cCwEGVGKf12vd6g67FCH33M2ypyyc/https%3A%2F%2Fgroups.google.com%2Fa%2Flist.nist.gov%2Fg%2Fpqc-forum>
   [4] A.M. Fregly, B. Kaliski. J. Harvey, D. Wessels.  Stateless Hash-Based
   Signatures in Merkle Tree Ladder Mode (SLH-DSA-MTL) for DNSSEC.
   draft-fregly-dnsop-slh-dsa-mtl-dnssec-02, July 8, 2024,
   https://datatracker.ietf.org/doc/draft-fregly-dnsop-slh-dsa-mtl-dnssec/02/<https://secure-web.cisco.com/1NRQ9IsfVhHkH5ZodHWJShguYTuBnkCC61LERYiiJfrrpWJCQqCCm2Adtjyk9zsNZv4g8fH4u1kPo4UbO_eHBTHW7FcSAWYPC_iM8Y14Savrl-y7OAuWtFjEC6oreE2qpuUpY7rY2dQ5wiGb4tdxHGZC88-KyXakU9UXh98UbJJ9PbXBGHL8wO7KsMbJwCiinpOj4jsWwHhmG7kzgf4o0M7bNf6rposDeoqgA5Su4C0_Zdi0wZHjufre_Zt8bhUajyeBtTm8aST0XavPCgHIZ_U87wEeXvgfvvrCcfetoILc/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-fregly-dnsop-slh-dsa-mtl-dnssec%2F02%2F>
   [5] Exploring Implementation Approaches for Merkle Tree Ladder Mode
   Signatures for DNSSEC, IETF 120 Hackathon,
   https://wiki.ietf.org/en/meeting/120/hackathon<https://secure-web.cisco.com/1DYTsFHDt7e1QDQ_KwQRlMAKfIUaUkW2GnPMrBxU7veXxhxmnXiQdr1KtsYyKz8Ti4j6gY2KJq6cjZFv43FH-IL-7rzSQ_XJBuzzqdlfhPA3IXGOfyzuwuKtkvj4r9MsqkQvsYuabPT7mKC5LBjQ2yb2tBUAPDiITSnYThfIhsZ41-sZb5rWhH562jKPQwHRDlr5hsDbxmWaQCTggoZoAiPobTM0pozY2YQHVFw1SU6gr8JWgmhdDz5GwOh0m30OzgKRsZccJ67xFogpVV6zZ7eSRsk3PSffscJ7L0XNPYSo/https%3A%2F%2Fwiki.ietf.org%2Fen%2Fmeeting%2F120%2Fhackathon>
   [6] A. Fregly, Stateless Hash-Based Signatures in Merkle Tree Ladder Mode
   (SLH-DSA-MTL) for DNSSEC, IETF 120 HotRFC,
   https://datatracker.ietf.org/meeting/120/materials/slides-120-hotrfc-sessa-0
   4-stateless-hash-based-signatures-in-merkle-tree-ladder-mode-01<https://secure-web.cisco.com/1-MfRdMuoQLMog4-WY2pUPpzgwJmmVI2lhVETlEmxUyKLZIhAoMW4ptNEptz7MuHDWT-gJ_-IU4rnE-N7Pq6e7oAMy4oEnvacYWDgLYDDtgn56JFBF4IjkCheNdtVynTI8nUY4MwNXzRfb1rokZskbxSecLRE28BXlMJFd_QZmU7L0DRmZRkOrORI0GaKBDzzFIHBMyFOo9zKP8sJtwti4-btLmYVG7D1Bkn5lq6m4aboFghSI-NfQOom98_9URVkatDAg5t7Gpt8MT1CuqPZbVhJsfRSp7mIIkEnshS31Yw/https%3A%2F%2Fdatatracker.ietf.org%2Fmeeting%2F120%2Fmaterials%2Fslides-120-hotrfc-sessa-04-stateless-hash-based-signatures-in-merkle-tree-ladder-mode-01>
   [7] Side Meetings at IETF 120,
   https://wiki.ietf.org/en/meeting/120/sidemeetings<https://secure-web.cisco.com/1S9yIiT5sFDdVYn2nGpCwtMwSIbsVoaUPSEciDfEh9Up_EKWRB6F0o_4bNtb8agn3QX8CipL4hiTBWZ1MVFYBGlIlwzxR1ypenQ1WK2sJUz2AcBN_0zDpT7t3jE8G1z7cbRozB4Bz-4xXZ9EqDZVmZLhorbNXxZhOIRThqbj60uNYOdISWsv6qGlIDiCbYAdQ3udsBzRItnjA47v0zVSxscrD2ZGUdRKqqheo43t8Fa4HitD8SPf35JjuDKZ0-XOi4i1LVn8hDT7oT4FP4g3uDPHdi4iYsDFqUMKEilIPsJU/https%3A%2F%2Fwiki.ietf.org%2Fen%2Fmeeting%2F120%2Fsidemeetings>
   [8] pq-dnssec mailing list,
   https://mailarchive.ietf.org/arch/browse/pq-dnssec/<https://secure-web.cisco.com/1Z-I8CcbG2ec6kA1K6ghmh1S_CYPS3srle6Kd35Onnvgbqf5rXjY49OvcGxwOeTHksT8_VIxWKUpIWOldZN4uyGR03YuktldXx52Pj057ZXkYhpVCx4HqNjjUb16R5_HFz9qf0G1KDPOaGeBnT6KYNjfECO9qQkrYTkoIDcXF8Ora0yKrPouC6PUgNrKh85gUpYb0_ENZw1lzn8AgBF4IYbWs6eSD-jofkA6dwUVSWoJt7Hx5xnE-K-Q0t20zY_q798UyiQquy_LBnKQ7I3PgB0fpPXP10n-xceB7-mvgzKk/https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fbrowse%2Fpq-dnssec%2F>
   [9] A.M. Fregly et al., Research Agenda for a Post-Quantum DNSSEC.
   draft-fregly-research-agenda-for-pqc-dnssec-01, June 26, 2024,
   https://datatracker.ietf.org/doc/draft-fregly-research-agenda-for-pqc-dnssec
   /01/<https://secure-web.cisco.com/1qj5gDY1YVtQKEbmfKQlJ_5Ti14D9LnJYbjrrD5r264QRjzD_ciC1w4TtaR3tBrKjJdtWvrwnP_DDvzFnTki7zHpYFR3rxFd9k7q7-siArvEGo2ObuKHX1RgUY_FbmgHS_Gn4DV803R5g7wKAZUC7SLS7A1ByHBQfP6qGc7Td_9mZ75-vAzK0Q5AwelsoWPxI0AU-O1nnoHXUWglhhcp3YKHGiv-xtjZKd9hS6nGadX_O5S8V_8jauBzE4Cg-MEt-wNemtgU2Pv79JlqVmpIylLQa-PAnQPK6kLiG0aaLQ8Y/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-fregly-research-agenda-for-pqc-dnssec%2F01%2F>
   [10] M. Ounsworth et al., Composite ML-KEM for Use in the Internet X.509
   Public Key Infrastructure and CMS.  draft-ietf-lamps-pq-composite-kem-04,
   July 8, 2024,
   https://datatracker.ietf.org/doc/draft-ietf-lamps-pq-composite-kem/04/<https://secure-web.cisco.com/1GDKK7pNi3_W2yc3KLslkc90t1AgLHRQz9XzadBY1dT75qewnKjBboGSPvU70Pauroz03pZ4N-KjFNomTiLgQC7vMUsw19mc-u8-QMV-ACM7wvn5LPdhFIm2ldm0s4SSmiYmWhBT_AWRS44bz96fdzTDSOUxuEW_C-B0CdIapCVt166L4-qrPpjz1DSGRQBVz9jkJ1TFyh4pKApWk_33pu1_6bDWrEW5oorGILHCLceRYvmR3QzN6856eB1MdFJA-a2Q4wcd3xGNkcZB1D42KiuWzrgKo3EDmlSVqyRcjv9E/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-ietf-lamps-pq-composite-kem%2F04%2F>
   [11]
   https://datatracker.ietf.org/ipr/search/?draft=draft-harvey-cfrg-mtl-mode&rf
   c=&doctitle=&group=&holder=VeriSign%2C+Inc.&iprtitle=&patent=&submit=draft<https://secure-web.cisco.com/1oMoP2kEIYKPT56CXe5iru2wfKXIzg9AKUV6dkRslxUSA_3AlIz-agQ04DkrfDe7QAX8_ctvh6l5WXfRvMhkCPHSiZSzK8ax9RiMpL7NvfbckaEqA6lsTu_QAMsWN4zlFMG7CqplIRGtYhachT-UD5uB4wHBadcj5cF4-qEwOluiWjSR0OG_E_y2F0cbag4ELZfwAqV2Lr4PpYswKZo7e98f5YuLh5kKjuCl9RL8UR6HjCESZ9IHlYQwgBCI1f7NL0Qc-IXz3uxTWlm-JquDkzl7o1miw8Jsd8E8LfhgMcp8/https%3A%2F%2Fdatatracker.ietf.org%2Fipr%2Fsearch%2F%3Fdraft%3Ddraft-harvey-cfrg-mtl-mode%26rfc%3D%26doctitle%3D%26group%3D%26holder%3DVeriSign%252C%2BInc.%26iprtitle%3D%26patent%3D%26submit%3Ddraft>

   _______________________________________________
   CFRG mailing list -- cfrg@irtf.org<mailto:cfrg@irtf.org>
   To unsubscribe send an email to cfrg-leave@irtf.org<mailto:cfrg-leave@irtf.org>