- From: Edgar, Gerald <gerald.edgar@boeing.com>
- Date: Thu, 3 Feb 2011 10:50:14 -0800
- To: "public-xmlsec@w3.org" <public-xmlsec@w3.org>
Reading this RFC I found this portion on page 3: ... The adoption of ECC has been slower than had been anticipated, perhaps due to the lack of freely available normative documents and uncertainty over intellectual property rights. This note contains a description of the fundamental algorithms of ECC over finite fields with characteristic greater than three, based directly on original references. Its intent is to provide the Internet community with a summary of the basic algorithms that predate any specialized or optimized algorithms. The summary is detailed enough for use as a normative reference. ... Does this mean basing our references to ECC on the material in this RFC could comply with W3C patent Policy? Gerald Edgar, Boeing -----Original Message----- From: public-xmlsec-request@w3.org [mailto:public-xmlsec-request@w3.org] On Behalf Of Thomas Roessler Sent: Wednesday, February 02, 2011 11:00 PM To: public-xmlsec@w3.org Cc: Thomas Roessler Subject: Fwd: RFC 6090 on Fundamental Elliptic Curve Cryptography Algorithms FYI -- Thomas Roessler, W3C <tlr@w3.org> (@roessler) Begin forwarded message: > From: rfc-editor@rfc-editor.org > Date: 3 February 2011 05:03:26 GMT+01:00 > To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org > Cc: rfc-editor@rfc-editor.org > Subject: RFC 6090 on Fundamental Elliptic Curve Cryptography > Algorithms > > > A new Request for Comments is now available in online RFC libraries. > > > RFC 6090 > > Title: Fundamental Elliptic Curve Cryptography Algorithms > Author: D. McGrew, K. Igoe, > M. Salter > Status: Informational > Stream: IETF > Date: February 2011 > Mailbox: mcgrew@cisco.com, > kmigoe@nsa.gov, > msalter@restarea.ncsc.mil > Pages: 34 > Characters: 75993 > Updates/Obsoletes/SeeAlso: None > > I-D Tag: draft-mcgrew-fundamental-ecc-04.txt > > URL: http://www.rfc-editor.org/rfc/rfc6090.txt > > This note describes the fundamental algorithms of Elliptic Curve > Cryptography (ECC) as they were defined in some seminal references > from 1994 and earlier. These descriptions may be useful for > implementing the fundamental algorithms without using any of the > specialized methods that were developed in following years. Only > elliptic curves defined over fields of characteristic greater than > three are in scope; these curves are those used in Suite B. > This document is not an Internet Standards Track specification; it is > published for informational purposes. > > > INFORMATIONAL: This memo provides information for the Internet community. > It does not specify an Internet standard of any kind. Distribution of > this memo is unlimited. > > This announcement is sent to the IETF-Announce and rfc-dist lists. > To subscribe or unsubscribe, see > http://www.ietf.org/mailman/listinfo/ietf-announce > http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist > > For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html. > For downloading RFCs, see http://www.rfc-editor.org/rfc.html. > > Requests for special distribution should be addressed to either the > author of the RFC in question, or to rfc-editor@rfc-editor.org. > Unless specifically noted otherwise on the RFC itself, all RFCs are > for unlimited distribution. > > > The RFC Editor Team > Association Management Solutions, LLC > > > _______________________________________________ > IETF-Announce mailing list > IETF-Announce@ietf.org > https://www.ietf.org/mailman/listinfo/ietf-announce >
Received on Thursday, 3 February 2011 19:53:28 UTC