diff options
author | Martin Schanzenbach <schanzen@gnunet.org> | 2022-02-09 01:20:29 +0100 |
---|---|---|
committer | Martin Schanzenbach <schanzen@gnunet.org> | 2022-02-09 01:20:29 +0100 |
commit | 34cbe9831d7297f251b62cc1b99c45ea86f465f1 (patch) | |
tree | e65c633dd3461310e0d9abf8e428881003c8617e | |
parent | a1dcde81c360ea83a1c74dc446ace1a4816f34b8 (diff) | |
download | lsd0001-34cbe9831d7297f251b62cc1b99c45ea86f465f1.tar.gz lsd0001-34cbe9831d7297f251b62cc1b99c45ea86f465f1.zip |
more crockford
-rw-r--r-- | draft-schanzen-gns.xml | 631 |
1 files changed, 326 insertions, 305 deletions
diff --git a/draft-schanzen-gns.xml b/draft-schanzen-gns.xml index ade5adc..42f1e4e 100644 --- a/draft-schanzen-gns.xml +++ b/draft-schanzen-gns.xml | |||
@@ -451,15 +451,15 @@ | |||
451 | The zTLD is used as a globally unique reference to a specific | 451 | The zTLD is used as a globally unique reference to a specific |
452 | namespace in the process of name resolution. | 452 | namespace in the process of name resolution. |
453 | To encode the zone key, a zone key label zkl is derived from a | 453 | To encode the zone key, a zone key label zkl is derived from a |
454 | concatenation of the zone type and zone key (see <xref target="figure_zid"/>) | 454 | concatenation of the zone type and zone key (see <xref target="figure_zid"/>). |
455 | using the Crockford Base32 encoding <xref target="CrockfordB32"/>. | 455 | The result is encoded using a variation of the Crockford Base32 encoding <xref target="CrockfordB32"/>. |
456 | In order to further increase tolerance for failures in character | 456 | In order to further increase tolerance for failures in character |
457 | recognition, the letter "U" MUST be decoded to the same Base32 value as the | 457 | recognition, the letter "U" MUST be decoded to the same Base32 value as the |
458 | letter "V". | 458 | letter "V". |
459 | The encoding and decoding symbols for Crockford Base32 including this modification are defined in | 459 | The encoding and decoding symbols for Crockford Base32 including this modification are defined in |
460 | <xref target="CrockfordB32Encode"/>. | 460 | <xref target="CrockfordB32Encode"/>. |
461 | The functions for encoding and decoding based on this table are called | 461 | The functions for encoding and decoding based on this table are called |
462 | GNSCrockfordEncode and GNSCrockfordDecode, respectively. | 462 | GNSBase32Encode and GNSBase32Decode, respectively. |
463 | </t> | 463 | </t> |
464 | <figure anchor="CrockfordB32Encode"> | 464 | <figure anchor="CrockfordB32Encode"> |
465 | <artwork name="" type="" align="left" alt=""><![CDATA[ | 465 | <artwork name="" type="" align="left" alt=""><![CDATA[ |
@@ -506,8 +506,8 @@ Value Symbol Symbol | |||
506 | For the string representation of a zTLD we define: | 506 | For the string representation of a zTLD we define: |
507 | </t> | 507 | </t> |
508 | <artwork name="" type="" align="left" alt=""><![CDATA[ | 508 | <artwork name="" type="" align="left" alt=""><![CDATA[ |
509 | zkl := GNSCrockfordEncode(ztype|zkey) | 509 | zkl := GNSBase32Encode(ztype|zkey) |
510 | ztype|zkey := GNSCrockfordDecode(zkl) | 510 | ztype|zkey := GNSBase32Decode(zkl) |
511 | ]]></artwork> | 511 | ]]></artwork> |
512 | <t> | 512 | <t> |
513 | If zkl is less than 63 characters, it can directly be | 513 | If zkl is less than 63 characters, it can directly be |
@@ -2631,8 +2631,329 @@ Purpose | Name | References | Comment | |||
2631 | </t> | 2631 | </t> |
2632 | </section> | 2632 | </section> |
2633 | <section> | 2633 | <section> |
2634 | <name>Acknowledgements</name> | ||
2635 | <t> | ||
2636 | The authors thank D. J. Bernstein, A. Farrel and S. Bortzmeyer for their | ||
2637 | insightful reviews. We thank NLnet and NGI DISCOVERY for funding | ||
2638 | work on the GNU Name System. | ||
2639 | </t> | ||
2640 | </section> | ||
2641 | </middle> | ||
2642 | <back> | ||
2643 | <references> | ||
2644 | <name>Normative References</name> | ||
2645 | |||
2646 | &RFC1034; | ||
2647 | &RFC1035; | ||
2648 | &RFC2782; | ||
2649 | &RFC2119; | ||
2650 | &RFC3629; | ||
2651 | &RFC3686; | ||
2652 | &RFC3826; | ||
2653 | &RFC5237; | ||
2654 | &RFC5869; | ||
2655 | &RFC5890; | ||
2656 | &RFC5891; | ||
2657 | &RFC6234; | ||
2658 | &RFC6895; | ||
2659 | &RFC6979; | ||
2660 | &RFC7748; | ||
2661 | &RFC8032; | ||
2662 | &RFC8126; | ||
2663 | &RFC8174; | ||
2664 | &RFC8499; | ||
2665 | &RFC9106; | ||
2666 | |||
2667 | <reference anchor="GANA" target="https://gana.gnunet.org/"> | ||
2668 | <front> | ||
2669 | <title>GNUnet Assigned Numbers Authority (GANA)</title> | ||
2670 | <author><organization>GNUnet e.V.</organization> | ||
2671 | </author> | ||
2672 | <date month="April" year="2020" /> | ||
2673 | </front> | ||
2674 | </reference> | ||
2675 | |||
2676 | <reference anchor="MODES" target="https://doi.org/10.6028/NIST.SP.800-38A"> | ||
2677 | <front> | ||
2678 | <title>Recommendation for Block Cipher Modes of Operation: Methods and Techniques</title> | ||
2679 | <author initials="M." surname="Dworkin" fullname="Morris Dworkin"> | ||
2680 | <organization>NIST</organization> | ||
2681 | </author> | ||
2682 | |||
2683 | <date year="2001" month="December"/> | ||
2684 | <abstract> | ||
2685 | <t> | ||
2686 | This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data. | ||
2687 | </t> | ||
2688 | </abstract> | ||
2689 | </front> | ||
2690 | </reference> | ||
2691 | <!-- <reference anchor="GCM" target="https://doi.org/10.6028/NIST.SP.800-38D"> | ||
2692 | <front> | ||
2693 | <title>Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</title> | ||
2694 | <author initials="M." surname="Dworkin" fullname="Morris Dworkin"> | ||
2695 | <organization>NIST</organization> | ||
2696 | </author> | ||
2697 | |||
2698 | <date year="2007" month="November"/> | ||
2699 | <abstract> | ||
2700 | <t> | ||
2701 | This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC are modes of operation for an underlying approved symmetric key block cipher. | ||
2702 | </t> | ||
2703 | </abstract> | ||
2704 | </front> | ||
2705 | </reference>--> | ||
2706 | <reference anchor="CrockfordB32" target="https://www.crockford.com/base32.html"> | ||
2707 | <front> | ||
2708 | <title>Base32</title> | ||
2709 | <author initials="D." surname="Douglas" fullname="Crockford"> | ||
2710 | </author> | ||
2711 | |||
2712 | <date year="2019" month="March"/> | ||
2713 | </front> | ||
2714 | </reference> | ||
2715 | <reference anchor="XSalsa20" target="https://cr.yp.to/snuffle/xsalsa-20110204.pdf"> | ||
2716 | <front> | ||
2717 | <title>Extending the Salsa20 nonce</title> | ||
2718 | <author initials="D." surname="Bernstein" fullname="Daniel Bernstein"> | ||
2719 | <organization>University of Illinois at Chicago</organization> | ||
2720 | </author> | ||
2721 | <date year="2011"/> | ||
2722 | </front> | ||
2723 | </reference> | ||
2724 | <reference anchor="Unicode-UAX15" target="http://www.unicode.org/reports/tr15/tr15-31.html"> | ||
2725 | <front> | ||
2726 | <title>Unicode Standard Annex #15: Unicode Normalization Forms, Revision 31</title> | ||
2727 | <author fullname="The Unicode Consortium"> | ||
2728 | <organization>University of Illinois at Chicago</organization> | ||
2729 | </author> | ||
2730 | <date year="2009" month="September"/> | ||
2731 | </front> | ||
2732 | </reference> | ||
2733 | |||
2734 | |||
2735 | |||
2736 | <!-- <reference anchor="ISO20022"> | ||
2737 | <front> | ||
2738 | <title>ISO 20022 Financial Services - Universal financial industry message scheme</title> | ||
2739 | <author> | ||
2740 | <organization>International Organization for Standardization</organization> | ||
2741 | <address> | ||
2742 | <uri>http://www.iso.ch</uri> | ||
2743 | </address> | ||
2744 | </author> | ||
2745 | <date month="May" year="2013"/> | ||
2746 | </front> | ||
2747 | </reference>--> | ||
2748 | </references> | ||
2749 | <references> | ||
2750 | <name>Informative References</name> | ||
2751 | &RFC4033; | ||
2752 | <!-- &RFC6781; --> | ||
2753 | &RFC7363; | ||
2754 | &RFC8324; | ||
2755 | <!-- &RFC3912;--> | ||
2756 | |||
2757 | <reference anchor="Tor224" target="https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt#n2135"> | ||
2758 | <front> | ||
2759 | <title>Next-Generation Hidden Services in Tor</title> | ||
2760 | <author initials="D." surname="Goulet" fullname="David Goulet"> | ||
2761 | </author> | ||
2762 | <author initials="G." surname="Kadianakis" fullname="George Kadianakis"> | ||
2763 | </author> | ||
2764 | <author initials="N." surname="Mathewson" fullname="Nick Mathewson"> | ||
2765 | </author> | ||
2766 | |||
2767 | <date year="2013" month="November"/> | ||
2768 | </front> | ||
2769 | </reference> | ||
2770 | <reference anchor="SDSI" target="http://people.csail.mit.edu/rivest/Sdsi10.ps"> | ||
2771 | <front> | ||
2772 | <title>SDSI - A Simple Distributed Security Infrastructure</title> | ||
2773 | <author initials="R." surname="Rivest" fullname="Ron Rivest"> | ||
2774 | </author> | ||
2775 | <author initials="B." surname="Lampson" fullname="Butler Lampson"> | ||
2776 | </author> | ||
2777 | <date year="1996" month="April"/> | ||
2778 | </front> | ||
2779 | </reference> | ||
2780 | <reference anchor="Kademlia" target="http://css.csail.mit.edu/6.824/2014/papers/kademlia.pdf"> | ||
2781 | <front> | ||
2782 | <title>Kademlia: A peer-to-peer information system based on the xor metric.</title> | ||
2783 | <author initials="P." surname="Maymounkov" fullname="Petar Maymounkov"> | ||
2784 | </author> | ||
2785 | |||
2786 | <author initials="D." surname="Mazieres" | ||
2787 | fullname="David Mazieres"> | ||
2788 | </author> | ||
2789 | <date year="2002"/> | ||
2790 | </front> | ||
2791 | </reference> | ||
2792 | <!--<reference anchor="Ipfs" target="https://arxiv.org/pdf/1407.3561"> | ||
2793 | <front> | ||
2794 | <title>Ipfs-content addressed, versioned, p2p file system.</title> | ||
2795 | <author initials="J." surname="Benet" fullname="Juan Benet"> | ||
2796 | </author> | ||
2797 | <date year="2014"/> | ||
2798 | </front> | ||
2799 | </reference> | ||
2800 | --> | ||
2801 | |||
2802 | <reference anchor="ed25519" target="http://link.springer.com/chapter/10.1007/978-3-642-23951-9_9"> | ||
2803 | <front> | ||
2804 | <title>High-Speed High-Security Signatures</title> | ||
2805 | <author initials="D." surname="Bernstein" fullname="Daniel Bernstein"> | ||
2806 | <organization>University of Illinois at Chicago</organization> | ||
2807 | </author> | ||
2808 | |||
2809 | <author initials="N." surname="Duif" | ||
2810 | fullname="Niels Duif"> | ||
2811 | <organization>Technische Universiteit Eindhoven</organization> | ||
2812 | |||
2813 | </author> | ||
2814 | <author initials="T." surname="Lange" | ||
2815 | fullname="Tanja Lange"> | ||
2816 | <organization>Technische Universiteit Eindhoven</organization> | ||
2817 | |||
2818 | </author> | ||
2819 | <author initials="P." surname="Schwabe" | ||
2820 | fullname="Peter Schwabe"> | ||
2821 | <organization>National Taiwan University</organization> | ||
2822 | |||
2823 | </author> | ||
2824 | <author initials="B." surname="Yang" | ||
2825 | fullname="Bo-Yin Yang"> | ||
2826 | <organization>Academia Sinica</organization> | ||
2827 | |||
2828 | </author> | ||
2829 | <date year="2011"/> | ||
2830 | </front> | ||
2831 | </reference> | ||
2832 | <reference anchor="GNS" target="https://sci-hub.st/10.1007/978-3-319-12280-9_9"> | ||
2833 | <front> | ||
2834 | <title>A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System</title> | ||
2835 | <author initials="M." surname="Wachs" fullname="Matthias Wachs"> | ||
2836 | <organization>Technische Universität München</organization> | ||
2837 | </author> | ||
2838 | |||
2839 | <author initials="M." surname="Schanzenbach" fullname="Martin Schanzenbach"> | ||
2840 | <organization>Technische Universität München</organization> | ||
2841 | </author> | ||
2842 | |||
2843 | <author initials="C." surname="Grothoff" | ||
2844 | fullname="Christian Grothoff"> | ||
2845 | <organization>Technische Universität München</organization> | ||
2846 | </author> | ||
2847 | <date year="2014"/> | ||
2848 | </front> | ||
2849 | </reference> | ||
2850 | <reference anchor="R5N" target="https://sci-hub.st/10.1109/ICNSS.2011.6060022"> | ||
2851 | <front> | ||
2852 | <title>R5N: Randomized recursive routing for restricted-route networks</title> | ||
2853 | <author initials="N. S." surname="Evans" fullname="Nathan S. Evans"> | ||
2854 | <organization>Technische Universität München</organization> | ||
2855 | </author> | ||
2856 | |||
2857 | <author initials="C." surname="Grothoff" | ||
2858 | fullname="Christian Grothoff"> | ||
2859 | <organization>Technische Universität München</organization> | ||
2860 | </author> | ||
2861 | <date year="2011"/> | ||
2862 | </front> | ||
2863 | </reference> | ||
2864 | <reference anchor="SecureNS" target="https://sci-hub.st/https://doi.org/10.1016/j.cose.2018.01.018"> | ||
2865 | <front> | ||
2866 | <title>Towards secure name resolution on the Internet</title> | ||
2867 | <author initials="C." surname="Grothoff" | ||
2868 | fullname="Christian Grothoff"> | ||
2869 | <organization>Bern University of Applied Sciences</organization> | ||
2870 | </author> | ||
2871 | <author initials="M." surname="Wachs" | ||
2872 | fullname="Matthias Wachs"> | ||
2873 | <organization>Technische Universität München</organization> | ||
2874 | </author> | ||
2875 | <author initials="M." surname="Ermert" | ||
2876 | fullname="Monika Ermert"> | ||
2877 | </author> | ||
2878 | |||
2879 | <author initials="J." surname="Appelbaum" | ||
2880 | fullname="Jacob Appelbaum"> | ||
2881 | <organization>TU Eindhoven</organization> | ||
2882 | </author> | ||
2883 | <date year="2018"/> | ||
2884 | </front> | ||
2885 | </reference> | ||
2886 | |||
2887 | <reference anchor="GNUnetGNS" target="https://git.gnunet.org/gnunet.git/tree/src/gns"> | ||
2888 | <front> | ||
2889 | <title>The GNUnet GNS Implementation</title> | ||
2890 | <author> | ||
2891 | <organization>GNUnet e.V.</organization> | ||
2892 | </author> | ||
2893 | </front> | ||
2894 | </reference> | ||
2895 | <reference anchor="Ascension" target="https://git.gnunet.org/ascension.git"> | ||
2896 | <front> | ||
2897 | <title>The Ascension Implementation</title> | ||
2898 | <author> | ||
2899 | <organization>GNUnet e.V.</organization> | ||
2900 | </author> | ||
2901 | </front> | ||
2902 | </reference> | ||
2903 | |||
2904 | <reference anchor="GNUnet" target="https://gnunet.org"> | ||
2905 | <front> | ||
2906 | <title>The GNUnet Project</title> | ||
2907 | <author> | ||
2908 | <organization>GNUnet e.V.</organization> | ||
2909 | </author> | ||
2910 | </front> | ||
2911 | </reference> | ||
2912 | <reference anchor="reclaim" target="https://reclaim.gnunet.org"> | ||
2913 | <front> | ||
2914 | <title>The GNUnet Project</title> | ||
2915 | <author> | ||
2916 | <organization>GNUnet e.V.</organization> | ||
2917 | </author> | ||
2918 | </front> | ||
2919 | </reference> | ||
2920 | |||
2921 | <reference anchor="GoGNS" target="https://github.com/bfix/gnunet-go/tree/master/src/gnunet/service/gns"> | ||
2922 | <front> | ||
2923 | <title>The Go GNS Implementation</title> | ||
2924 | <author initials="B." surname="Fix" fullname="Bernd Fix"> | ||
2925 | </author> | ||
2926 | </front> | ||
2927 | </reference> | ||
2928 | |||
2929 | |||
2930 | |||
2931 | |||
2932 | |||
2933 | </references> | ||
2934 | <section> | ||
2634 | <name>Test Vectors</name> | 2935 | <name>Test Vectors</name> |
2635 | <t> | 2936 | <t> |
2937 | |||
2938 | </t> | ||
2939 | <artwork name="" type="" align="left" alt=""> | ||
2940 | <![CDATA[ | ||
2941 | GNSBase32Encode: | ||
2942 | Input string: "Hello World" | ||
2943 | Output string: "91JPRV3F41BPYWKCCG" | ||
2944 | |||
2945 | Input bytes: 474e55204e610x6d652053797374656d | ||
2946 | Output string: "8X75A82EC5PPA82KF5SQ8SBD" | ||
2947 | |||
2948 | GNSBase32Decode: | ||
2949 | Input string: "91JPRV3F41BPYWKCCG" | ||
2950 | Output string: "Hello World" | ||
2951 | |||
2952 | Input string: "91JPRU3F41BPYWKCCG" | ||
2953 | Output string: "Hello World" | ||
2954 | ]]> | ||
2955 | </artwork> | ||
2956 | <t> | ||
2636 | The following represents a test vector for a record set with a DNS | 2957 | The following represents a test vector for a record set with a DNS |
2637 | record of type "A" as well as a GNS record of type "PKEY" | 2958 | record of type "A" as well as a GNS record of type "PKEY" |
2638 | under the label "test". | 2959 | under the label "test". |
@@ -3202,307 +3523,7 @@ c9d7b9ab | |||
3202 | ]]> | 3523 | ]]> |
3203 | </artwork> | 3524 | </artwork> |
3204 | </section> | 3525 | </section> |
3205 | <section> | ||
3206 | <name>Acknowledgements</name> | ||
3207 | <t> | ||
3208 | The authors thank D. J. Bernstein, A. Farrel and S. Bortzmeyer for their | ||
3209 | insightful reviews. We thank NLnet and NGI DISCOVERY for funding | ||
3210 | work on the GNU Name System. | ||
3211 | </t> | ||
3212 | </section> | ||
3213 | </middle> | ||
3214 | <back> | ||
3215 | <references> | ||
3216 | <name>Normative References</name> | ||
3217 | 3526 | ||
3218 | &RFC1034; | ||
3219 | &RFC1035; | ||
3220 | &RFC2782; | ||
3221 | &RFC2119; | ||
3222 | &RFC3629; | ||
3223 | &RFC3686; | ||
3224 | &RFC3826; | ||
3225 | &RFC5237; | ||
3226 | &RFC5869; | ||
3227 | &RFC5890; | ||
3228 | &RFC5891; | ||
3229 | &RFC6234; | ||
3230 | &RFC6895; | ||
3231 | &RFC6979; | ||
3232 | &RFC7748; | ||
3233 | &RFC8032; | ||
3234 | &RFC8126; | ||
3235 | &RFC8174; | ||
3236 | &RFC8499; | ||
3237 | &RFC9106; | ||
3238 | |||
3239 | <reference anchor="GANA" target="https://gana.gnunet.org/"> | ||
3240 | <front> | ||
3241 | <title>GNUnet Assigned Numbers Authority (GANA)</title> | ||
3242 | <author><organization>GNUnet e.V.</organization> | ||
3243 | </author> | ||
3244 | <date month="April" year="2020" /> | ||
3245 | </front> | ||
3246 | </reference> | ||
3247 | |||
3248 | <reference anchor="MODES" target="https://doi.org/10.6028/NIST.SP.800-38A"> | ||
3249 | <front> | ||
3250 | <title>Recommendation for Block Cipher Modes of Operation: Methods and Techniques</title> | ||
3251 | <author initials="M." surname="Dworkin" fullname="Morris Dworkin"> | ||
3252 | <organization>NIST</organization> | ||
3253 | </author> | ||
3254 | |||
3255 | <date year="2001" month="December"/> | ||
3256 | <abstract> | ||
3257 | <t> | ||
3258 | This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR). Used with an underlying block cipher algorithm that is approved in a Federal Information Processing Standard (FIPS), these modes can provide cryptographic protection for sensitive, but unclassified, computer data. | ||
3259 | </t> | ||
3260 | </abstract> | ||
3261 | </front> | ||
3262 | </reference> | ||
3263 | <!-- <reference anchor="GCM" target="https://doi.org/10.6028/NIST.SP.800-38D"> | ||
3264 | <front> | ||
3265 | <title>Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC</title> | ||
3266 | <author initials="M." surname="Dworkin" fullname="Morris Dworkin"> | ||
3267 | <organization>NIST</organization> | ||
3268 | </author> | ||
3269 | |||
3270 | <date year="2007" month="November"/> | ||
3271 | <abstract> | ||
3272 | <t> | ||
3273 | This Recommendation specifies the Galois/Counter Mode (GCM), an algorithm for authenticated encryption with associated data, and its specialization, GMAC, for generating a message authentication code (MAC) on data that is not encrypted. GCM and GMAC are modes of operation for an underlying approved symmetric key block cipher. | ||
3274 | </t> | ||
3275 | </abstract> | ||
3276 | </front> | ||
3277 | </reference>--> | ||
3278 | <reference anchor="CrockfordB32" target="https://www.crockford.com/base32.html"> | ||
3279 | <front> | ||
3280 | <title>Base32</title> | ||
3281 | <author initials="D." surname="Douglas" fullname="Crockford"> | ||
3282 | </author> | ||
3283 | |||
3284 | <date year="2019" month="March"/> | ||
3285 | </front> | ||
3286 | </reference> | ||
3287 | <reference anchor="XSalsa20" target="https://cr.yp.to/snuffle/xsalsa-20110204.pdf"> | ||
3288 | <front> | ||
3289 | <title>Extending the Salsa20 nonce</title> | ||
3290 | <author initials="D." surname="Bernstein" fullname="Daniel Bernstein"> | ||
3291 | <organization>University of Illinois at Chicago</organization> | ||
3292 | </author> | ||
3293 | <date year="2011"/> | ||
3294 | </front> | ||
3295 | </reference> | ||
3296 | <reference anchor="Unicode-UAX15" target="http://www.unicode.org/reports/tr15/tr15-31.html"> | ||
3297 | <front> | ||
3298 | <title>Unicode Standard Annex #15: Unicode Normalization Forms, Revision 31</title> | ||
3299 | <author fullname="The Unicode Consortium"> | ||
3300 | <organization>University of Illinois at Chicago</organization> | ||
3301 | </author> | ||
3302 | <date year="2009" month="September"/> | ||
3303 | </front> | ||
3304 | </reference> | ||
3305 | |||
3306 | |||
3307 | |||
3308 | <!-- <reference anchor="ISO20022"> | ||
3309 | <front> | ||
3310 | <title>ISO 20022 Financial Services - Universal financial industry message scheme</title> | ||
3311 | <author> | ||
3312 | <organization>International Organization for Standardization</organization> | ||
3313 | <address> | ||
3314 | <uri>http://www.iso.ch</uri> | ||
3315 | </address> | ||
3316 | </author> | ||
3317 | <date month="May" year="2013"/> | ||
3318 | </front> | ||
3319 | </reference>--> | ||
3320 | </references> | ||
3321 | <references> | ||
3322 | <name>Informative References</name> | ||
3323 | &RFC4033; | ||
3324 | <!-- &RFC6781; --> | ||
3325 | &RFC7363; | ||
3326 | &RFC8324; | ||
3327 | <!-- &RFC3912;--> | ||
3328 | |||
3329 | <reference anchor="Tor224" target="https://gitweb.torproject.org/torspec.git/tree/proposals/224-rend-spec-ng.txt#n2135"> | ||
3330 | <front> | ||
3331 | <title>Next-Generation Hidden Services in Tor</title> | ||
3332 | <author initials="D." surname="Goulet" fullname="David Goulet"> | ||
3333 | </author> | ||
3334 | <author initials="G." surname="Kadianakis" fullname="George Kadianakis"> | ||
3335 | </author> | ||
3336 | <author initials="N." surname="Mathewson" fullname="Nick Mathewson"> | ||
3337 | </author> | ||
3338 | |||
3339 | <date year="2013" month="November"/> | ||
3340 | </front> | ||
3341 | </reference> | ||
3342 | <reference anchor="SDSI" target="http://people.csail.mit.edu/rivest/Sdsi10.ps"> | ||
3343 | <front> | ||
3344 | <title>SDSI - A Simple Distributed Security Infrastructure</title> | ||
3345 | <author initials="R." surname="Rivest" fullname="Ron Rivest"> | ||
3346 | </author> | ||
3347 | <author initials="B." surname="Lampson" fullname="Butler Lampson"> | ||
3348 | </author> | ||
3349 | <date year="1996" month="April"/> | ||
3350 | </front> | ||
3351 | </reference> | ||
3352 | <reference anchor="Kademlia" target="http://css.csail.mit.edu/6.824/2014/papers/kademlia.pdf"> | ||
3353 | <front> | ||
3354 | <title>Kademlia: A peer-to-peer information system based on the xor metric.</title> | ||
3355 | <author initials="P." surname="Maymounkov" fullname="Petar Maymounkov"> | ||
3356 | </author> | ||
3357 | |||
3358 | <author initials="D." surname="Mazieres" | ||
3359 | fullname="David Mazieres"> | ||
3360 | </author> | ||
3361 | <date year="2002"/> | ||
3362 | </front> | ||
3363 | </reference> | ||
3364 | <!--<reference anchor="Ipfs" target="https://arxiv.org/pdf/1407.3561"> | ||
3365 | <front> | ||
3366 | <title>Ipfs-content addressed, versioned, p2p file system.</title> | ||
3367 | <author initials="J." surname="Benet" fullname="Juan Benet"> | ||
3368 | </author> | ||
3369 | <date year="2014"/> | ||
3370 | </front> | ||
3371 | </reference> | ||
3372 | --> | ||
3373 | |||
3374 | <reference anchor="ed25519" target="http://link.springer.com/chapter/10.1007/978-3-642-23951-9_9"> | ||
3375 | <front> | ||
3376 | <title>High-Speed High-Security Signatures</title> | ||
3377 | <author initials="D." surname="Bernstein" fullname="Daniel Bernstein"> | ||
3378 | <organization>University of Illinois at Chicago</organization> | ||
3379 | </author> | ||
3380 | |||
3381 | <author initials="N." surname="Duif" | ||
3382 | fullname="Niels Duif"> | ||
3383 | <organization>Technische Universiteit Eindhoven</organization> | ||
3384 | |||
3385 | </author> | ||
3386 | <author initials="T." surname="Lange" | ||
3387 | fullname="Tanja Lange"> | ||
3388 | <organization>Technische Universiteit Eindhoven</organization> | ||
3389 | |||
3390 | </author> | ||
3391 | <author initials="P." surname="Schwabe" | ||
3392 | fullname="Peter Schwabe"> | ||
3393 | <organization>National Taiwan University</organization> | ||
3394 | |||
3395 | </author> | ||
3396 | <author initials="B." surname="Yang" | ||
3397 | fullname="Bo-Yin Yang"> | ||
3398 | <organization>Academia Sinica</organization> | ||
3399 | |||
3400 | </author> | ||
3401 | <date year="2011"/> | ||
3402 | </front> | ||
3403 | </reference> | ||
3404 | <reference anchor="GNS" target="https://sci-hub.st/10.1007/978-3-319-12280-9_9"> | ||
3405 | <front> | ||
3406 | <title>A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System</title> | ||
3407 | <author initials="M." surname="Wachs" fullname="Matthias Wachs"> | ||
3408 | <organization>Technische Universität München</organization> | ||
3409 | </author> | ||
3410 | |||
3411 | <author initials="M." surname="Schanzenbach" fullname="Martin Schanzenbach"> | ||
3412 | <organization>Technische Universität München</organization> | ||
3413 | </author> | ||
3414 | |||
3415 | <author initials="C." surname="Grothoff" | ||
3416 | fullname="Christian Grothoff"> | ||
3417 | <organization>Technische Universität München</organization> | ||
3418 | </author> | ||
3419 | <date year="2014"/> | ||
3420 | </front> | ||
3421 | </reference> | ||
3422 | <reference anchor="R5N" target="https://sci-hub.st/10.1109/ICNSS.2011.6060022"> | ||
3423 | <front> | ||
3424 | <title>R5N: Randomized recursive routing for restricted-route networks</title> | ||
3425 | <author initials="N. S." surname="Evans" fullname="Nathan S. Evans"> | ||
3426 | <organization>Technische Universität München</organization> | ||
3427 | </author> | ||
3428 | |||
3429 | <author initials="C." surname="Grothoff" | ||
3430 | fullname="Christian Grothoff"> | ||
3431 | <organization>Technische Universität München</organization> | ||
3432 | </author> | ||
3433 | <date year="2011"/> | ||
3434 | </front> | ||
3435 | </reference> | ||
3436 | <reference anchor="SecureNS" target="https://sci-hub.st/https://doi.org/10.1016/j.cose.2018.01.018"> | ||
3437 | <front> | ||
3438 | <title>Towards secure name resolution on the Internet</title> | ||
3439 | <author initials="C." surname="Grothoff" | ||
3440 | fullname="Christian Grothoff"> | ||
3441 | <organization>Bern University of Applied Sciences</organization> | ||
3442 | </author> | ||
3443 | <author initials="M." surname="Wachs" | ||
3444 | fullname="Matthias Wachs"> | ||
3445 | <organization>Technische Universität München</organization> | ||
3446 | </author> | ||
3447 | <author initials="M." surname="Ermert" | ||
3448 | fullname="Monika Ermert"> | ||
3449 | </author> | ||
3450 | |||
3451 | <author initials="J." surname="Appelbaum" | ||
3452 | fullname="Jacob Appelbaum"> | ||
3453 | <organization>TU Eindhoven</organization> | ||
3454 | </author> | ||
3455 | <date year="2018"/> | ||
3456 | </front> | ||
3457 | </reference> | ||
3458 | |||
3459 | <reference anchor="GNUnetGNS" target="https://git.gnunet.org/gnunet.git/tree/src/gns"> | ||
3460 | <front> | ||
3461 | <title>The GNUnet GNS Implementation</title> | ||
3462 | <author> | ||
3463 | <organization>GNUnet e.V.</organization> | ||
3464 | </author> | ||
3465 | </front> | ||
3466 | </reference> | ||
3467 | <reference anchor="Ascension" target="https://git.gnunet.org/ascension.git"> | ||
3468 | <front> | ||
3469 | <title>The Ascension Implementation</title> | ||
3470 | <author> | ||
3471 | <organization>GNUnet e.V.</organization> | ||
3472 | </author> | ||
3473 | </front> | ||
3474 | </reference> | ||
3475 | |||
3476 | <reference anchor="GNUnet" target="https://gnunet.org"> | ||
3477 | <front> | ||
3478 | <title>The GNUnet Project</title> | ||
3479 | <author> | ||
3480 | <organization>GNUnet e.V.</organization> | ||
3481 | </author> | ||
3482 | </front> | ||
3483 | </reference> | ||
3484 | <reference anchor="reclaim" target="https://reclaim.gnunet.org"> | ||
3485 | <front> | ||
3486 | <title>The GNUnet Project</title> | ||
3487 | <author> | ||
3488 | <organization>GNUnet e.V.</organization> | ||
3489 | </author> | ||
3490 | </front> | ||
3491 | </reference> | ||
3492 | |||
3493 | <reference anchor="GoGNS" target="https://github.com/bfix/gnunet-go/tree/master/src/gnunet/service/gns"> | ||
3494 | <front> | ||
3495 | <title>The Go GNS Implementation</title> | ||
3496 | <author initials="B." surname="Fix" fullname="Bernd Fix"> | ||
3497 | </author> | ||
3498 | </front> | ||
3499 | </reference> | ||
3500 | |||
3501 | |||
3502 | |||
3503 | |||
3504 | |||
3505 | </references> | ||
3506 | 3527 | ||
3507 | 3528 | ||
3508 | <!-- Change Log | 3529 | <!-- Change Log |