<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/tag/rfc</id>
  <updated>2019-04-18T16:50:27-04:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption</title>
    <link rel="alternate" href="https://www.rfc-editor.org/rfc/rfc8452.txt"/>
    <id>0a1c90c8b9b66d9f1fe17a8d44609abd</id>
    <published>2019-04-18T16:50:27-04:00</published>
    <updated>2019-04-18T16:50:27-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption</summary>
    <content type="html">they do not fail catastrophically if a nonce is repeated</content>
  </entry>
  <entry>
    <title>IETF | Herding the DNS Camel</title>
    <link rel="alternate" href="https://ietf.org/blog/herding-dns-camel/"/>
    <id>7cfbf60eb8db0b58b7cdcc45d943a07d</id>
    <published>2018-11-21T10:57:28-05:00</published>
    <updated>2018-11-21T10:57:28-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">IETF | Herding the DNS Camel</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Attacks on Cryptographic Hashes in Internet Protocols</title>
    <link rel="alternate" href="https://www.ietf.org/rfc/rfc4270.txt"/>
    <id>e0d58133a904e040296264a81bdf5887</id>
    <published>2015-12-29T17:29:34-05:00</published>
    <updated>2015-12-29T17:29:34-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Attacks on Cryptographic Hashes in Internet Protocols</summary>
    <content type="html">Recent announcements of better-than-expected collision attacks in
   popular hash algorithms have caused some people to question whether
   common Internet protocols need to be changed, and if so, how.</content>
  </entry>
</feed>
