All,

We have now received all necessary approvals and consider AUTH48 complete (see 
https://www.rfc-editor.org/auth48/rfc9936).

Thank you for your attention and guidance during the AUTH48 process! Once 
RFC-to-be 9935 (draft-ietf-lamps-kyber-certificates) completes AUTH48, we will 
prepare the document for publication.

Best,

Madison Church
RFC Production Center

> On Feb 24, 2026, at 11:43 AM, Julien Prat 
> <[email protected]> wrote:
> 
> Hi all,
> 
> I am fine with this latest update.
> 
> Thank you.
> 
> Regards,
> 
> Julien PratDe : Mike Ounsworth <[email protected]>
> Envoyé : mardi 24 février 2026 18:16
> À : Madison Church <[email protected]>
> Cc : Daniel Van Geest <[email protected]>; 
> [email protected]<[email protected]>; Julien Prat 
> <[email protected]>; [email protected] 
> <[email protected]>; [email protected] <[email protected]>; 
> [email protected]<[email protected]>; [email protected] 
> <[email protected]>; [email protected] 
> <[email protected]>; Deb Cooley <[email protected]>
> Objet : Re: AUTH48: RFC-to-be 9936 <draft-ietf-lamps-cms-kyber-13> for your 
> review
>  Hi Madison,
> 
> > *Mike - If you’d like, let us know if you want us to update your email 
> > address in this document.
> 
> Complicated situation: I'm switching from being a full-time employee to a 
> contractor; they are still paying me to finish off this work. I will have 
> access to that email address again once the laptop arrives, but it's not here 
> yet, yadda yadda. AUTH48 was gonna be the tricky point, and if we've survived 
> that, then great.
> 
> 
> -Mike 
> 
> "Knowing is a barrier which prevents learning" -- Frank Herbert, Dune.
> 
> 
> "An expert is a person who has found out by his own painful experience all 
> the mistakes that one can make in a very narrow field.” -- Niels Bohr
> 
> On Tuesday, February 24th, 2026 at 11:13 AM, Madison Church 
> <[email protected]> wrote:
> 
> > Hi Daniel and *Mike,
> > 
> > Thank you both for your prompt replies! We have noted your approvals (see 
> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285317759%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=8P7lfM3D1RhEgcw189a4wpJiTb4G3F8%2BWHVnojnAtrY%3D&reserved=0).
> > 
> > *Mike - If you’d like, let us know if you want us to update your email 
> > address in this document.
> > 
> > Once we receive approval from Julien, we will move forward in the 
> > publication process.
> > 
> > Thank you!
> > Madison Church
> > RFC Production Center
> > 
> > > On Feb 24, 2026, at 11:06 AM, Mike Ounsworth <[email protected]> wrote:
> > >
> > > Thanks Dan,
> > >
> > > Sorry for the confusion. [email protected] is technically still 
> > > active, and I can get someone to reply from it if you absolutely need 
> > > that.
> > >
> > >
> > > I agree with Dan on all points from his Feb 16 email: all those changes 
> > > seem good and do not nagatively affect technical content.
> > >
> > > I am good for this to go to publication.
> > >
> > >
> > > -Mike
> > >
> > > "Knowing is a barrier which prevents learning" -- Frank Herbert, Dune.
> > >
> > > "An expert is a person who has found out by his own painful experience 
> > > all the mistakes that one can make in a very narrow field.” -- Niels Bohr
> > >
> > > On Tuesday, February 24th, 2026 at 10:58 AM, Daniel Van Geest 
> > > <[email protected]> wrote:
> > >> Mike Ounsworth doesn't have access to his Entrust email address at the 
> > >> moment, so I'm adding his other IETF address (proof: 
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fperson%2Fmike%40ounsworth.ca&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285345627%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=XRwy8qQvQFT8KHWszECIMf81fbjkzFfP4QqqXkrr%2BQI%3D&reserved=0)
> > >>  which is hopefully sufficient for him to approve.
> > >>
> > >> Daniel
> > >>
> > >> From: Madison Church <[email protected]>
> > >> Sent: Tuesday, February 24, 2026 4:29 PM
> > >> To: Daniel Van Geest <[email protected]>; 
> > >> [email protected]<[email protected]>; Julien Prat 
> > >> <[email protected]>
> > >> Cc: [email protected] <[email protected]>; 
> > >> [email protected] <[email protected]>; [email protected] 
> > >> <[email protected]>; [email protected]<[email protected]>; 
> > >> [email protected] <[email protected]>; Deb Cooley 
> > >> <[email protected]>
> > >> Subject: Re: AUTH48: RFC-to-be 9936 <draft-ietf-lamps-cms-kyber-13> for 
> > >> your review
> > >>
> > >> Hi Daniel, Deb,
> > >>
> > >> Deb - Thank you for your response! We have marked your approval on the 
> > >> AUTH48 status 
> > >> page:https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285364341%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Ig1lv2MJRf7MpmckrW9yU%2FmYzI41G4BhIfP3Ii%2BBPTw%3D&reserved=0.
> > >>
> > >> Daniel - No worries! We have reverted the changes and posted the updated 
> > >> files below.
> > >>
> > >> Authors - Please review the document carefully to ensure satisfaction as 
> > >> we do not make changes once it has been published as an RFC. Contact us 
> > >> with any further updates or with your approval of the document in its 
> > >> current form. We will await approvals from each author prior to moving 
> > >> forward in the publication process.
> > >>
> > >> Updated files have been posted here (please refresh):
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.txt&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285384195%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=08ahJfh7Pd9uC67qfgInHoYObf5spW0149t%2Bf55KsZ0%3D&reserved=0
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.pdf&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285403795%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=jW8W9NaPwxnLYww8hjOXAYXHH0t5mq0EMfg8Y67INBQ%3D&reserved=0
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285422327%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=yC4%2FbaMz8BYi8pVfN6awbVqDrxnkkDxT%2BWTz1ksKoy8%3D&reserved=0
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.xml&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285439983%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=3HtpKnsFQmN%2BR0NX4vE87MbKzAWB81FmsRUpOWHAZnE%3D&reserved=0
> > >>
> > >> Updated diff files:
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285458855%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=a9Xbp7r8NNVJRahV7xH2bcSNyNDS%2F5XsEZiEPAEWcGI%3D&reserved=0
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-rfcdiff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285476700%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=hUYe4ZQvZv48tBjp9jFyIGlw6cF8cthNEBhcgHaeJ5U%3D&reserved=0
> > >>  (side by side)
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285495145%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=QcZ4WP1gOKOesV94Z0zo3w3gZ72fYhinKEndBML6r2s%3D&reserved=0
> > >>    
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48rfcdiff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285512924%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=EDGeuqf0MsuSDG%2Brq9MP7PZx%2BfFnfTU4AlJtPBht5PA%3D&reserved=0
> > >>  (side by side)
> > >>
> > >> AUTH48 status page: 
> > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285530815%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=6pmo35JWf3KwqJr4ii2R1710ExCWPaLgLA2dTFQ6Yc0%3D&reserved=0
> > >>
> > >> Thank you!
> > >>
> > >> Madison Church
> > >> RFC Production Center
> > >>
> > >> > On Feb 24, 2026, at 7:36 AM, Deb Cooley <[email protected]> wrote:
> > >> >
> > >> > oof, I'm fine with that too.
> > >> >
> > >> > Deb
> > >> >
> > >> > On Tue, Feb 24, 2026 at 7:08 AM Daniel Van Geest 
> > >> > <[email protected]> wrote:
> > >> > Hi again,
> > >> >
> > >> > My deepest apologies, the change that I requested before was actually 
> > >> > incorrect.  The original text was correct.  Because this entire 
> > >> > document is about encrypted data, I had thought that that section 
> > >> > needed to be updated to align with this.  But that section is in fact 
> > >> > about how the encrypted data capabilities are communicated within 
> > >> > signed data.
> > >> >
> > >> > So the original paragraph in section 2.4 was correct:
> > >> >
> > >> >    Section 2.5.2 of [RFC8551] defines the SMIMECapabilities attribute 
> > >> > to
> > >> >    announce a partial list of algorithms that an S/MIME implementation
> > >> >    can support.  When constructing a CMS signed-data content type
> > >> >    [RFC5652], a compliant implementation MAY include the
> > >> >    SMIMECapabilities attribute that announces support for one or more 
> > >> > of
> > >> >    the ML-KEM algorithm identifiers.
> > >> >
> > >> > Apologies again,
> > >> > Daniel
> > >> >
> > >> >
> > >> > From: Deb Cooley <[email protected]>
> > >> > Sent: Monday, February 23, 2026 10:08 PM
> > >> > To: Madison Church <[email protected]>
> > >> > Cc: Daniel Van Geest <[email protected]>; 
> > >> > [email protected] <[email protected]>; Julien Prat 
> > >> > <[email protected]>; [email protected] 
> > >> > <[email protected]>; [email protected] <[email protected]>; 
> > >> > [email protected] <[email protected]>; 
> > >> > [email protected]<[email protected]>; 
> > >> > [email protected] <[email protected]>
> > >> > Subject: Re: [AD] Re: AUTH48: RFC-to-be 9936 
> > >> > <draft-ietf-lamps-cms-kyber-13> for your review
> > >> >
> > >> > I approve the change.
> > >> >
> > >> > Deb
> > >> >
> > >> > On Mon, Feb 23, 2026 at 3:23 PM Madison Church 
> > >> > <[email protected]> wrote:
> > >> > Hi Daniel, *Deb,
> > >> >
> > >> > Daniel - Thank you for your reply! We have updated the document 
> > >> > accordingly.
> > >> >
> > >> > *Deb - As responsible AD, please let us know if you approve the 
> > >> > correction in Section 2.4 (which can be viewed in this diff file: 
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285553608%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=6kqD6CCCijiRAU1quVBIw1fjl2OIublsTkszMi8edIs%3D&reserved=0).
> > >> >
> > >> > Authors - Please review the document carefully to ensure satisfaction 
> > >> > as we do not make changes once it has been published as an RFC. 
> > >> > Contact us with any further updates or with your approval of the 
> > >> > document in its current form. We will await approvals from each author 
> > >> > prior to moving forward in the publication process.
> > >> >
> > >> > Updated files have been posted here (please refresh):
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.txt&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285578448%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=wMLc96KaNqiR4vH0jQQUeQWfb8JlxpEgSVYEUADf1QQ%3D&reserved=0
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.pdf&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285599535%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=nls31m%2B6CTennam4B4E%2FsKbYQxv%2BgQ6SkgGMB9S4Wog%3D&reserved=0
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285617297%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=696DBh1%2FgycjqublbTX3H%2B9ZxZawZwb6S9eOUx9Fe18%3D&reserved=0
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.xml&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285635025%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=S5Dk1ql6qMQlmzQRb4JdSoUGKQLgIh%2FF0SfosU346lA%3D&reserved=0
> > >> >
> > >> > Updated diff files:
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285652232%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=iUp5QRbNIt65cHKDOm%2BrJEp%2Fh%2F5FqfNUPjg94lHzvLc%3D&reserved=0
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-rfcdiff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285669402%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=5CarWj%2F%2Bg7PXZD8Iqk558Yrrcfv%2FkQPBItfQH0V8F5I%3D&reserved=0
> > >> >  (side by side)
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285687141%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=sxJ1XnycfPisVDBkurKRYd54zk46lPpn1i6VYS2qyec%3D&reserved=0
> > >> >    
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48rfcdiff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285708409%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Cs%2BZcG5tRDxZbnfsCKw0jZ%2F31vO%2Bw7er8NHkncHkq1g%3D&reserved=0
> > >> >  (side by side)
> > >> >
> > >> > AUTH48 status page: 
> > >> > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285725839%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=16GA2C7LELYkgko10DAnHTq39qQJo694EDJKyaFVZmI%3D&reserved=0
> > >> >
> > >> > Thank you!
> > >> >
> > >> > Madison Church
> > >> > RFC Production Center
> > >> >
> > >> > > On Feb 23, 2026, at 5:06 AM, Daniel Van Geest 
> > >> > > <[email protected]> wrote:
> > >> > >
> > >> > > Hi Madison and all,
> > >> > >
> > >> > > I have just discovered an error in draft-ietf-lamps-cms-kyber-13.
> > >> > >
> > >> > > The wrong content type was mentioned in section 2.4.  The correct 
> > >> > > content types are mentioned throughout the rest of the document, so 
> > >> > > this section should be corrected to align with the rest of the 
> > >> > > document.
> > >> > >
> > >> > > OLD:
> > >> > >
> > >> > >    Section 2.5.2 of [RFC8551] defines the SMIMECapabilities 
> > >> > > attribute to
> > >> > >    announce a partial list of algorithms that an S/MIME 
> > >> > > implementation
> > >> > >    can support.  When constructing a CMS signed-data content type
> > >> > >    [RFC5652], a compliant implementation MAY include the
> > >> > >    SMIMECapabilities attribute that announces support for one or 
> > >> > > more of
> > >> > >    the ML-KEM algorithm identifiers.
> > >> > >
> > >> > > NEW:
> > >> > >
> > >> > >    Section 2.5.2 of [RFC8551] defines the SMIMECapabilities 
> > >> > > attribute to
> > >> > >    announce a partial list of algorithms that an S/MIME 
> > >> > > implementation
> > >> > >    can support.  When constructing a CMS enveloped-data content 
> > >> > > type, a
> > >> > >    CMS authenticated-data content type, or a CMS authenticated-
> > >> > >    enveloped-data content type, a compliant implementation MAY 
> > >> > > include
> > >> > >    the SMIMECapabilities attribute that announces support for one or
> > >> > >    more of the ML-KEM algorithm identifiers.
> > >> > >
> > >> > > Thanks,
> > >> > > Daniel
> > >> > >
> > >> > > From: Madison Church <[email protected]>
> > >> > > Sent: Thursday, February 19, 2026 9:35 PM
> > >> > > To: Daniel Van Geest <[email protected]>; 
> > >> > > Julien Prat <[email protected]>; 
> > >> > > [email protected] <[email protected]>
> > >> > > Cc: [email protected] <[email protected]>; 
> > >> > > [email protected] <[email protected]>; [email protected] 
> > >> > > <[email protected]>; [email protected]<[email protected]>; 
> > >> > > [email protected]<[email protected]>; 
> > >> > > [email protected] <[email protected]>
> > >> > > Subject: Re: AUTH48: RFC-to-be 9936 <draft-ietf-lamps-cms-kyber-13> 
> > >> > > for your review
> > >> > >
> > >> > > Hi Daniel,
> > >> > >
> > >> > > Thank you for your response! We have updated the document per your 
> > >> > > reply and we have no followup questions at this time. Once we have 
> > >> > > all author approvals for this document (and once RFC-to-be 9935 
> > >> > > completes AUTH48), we will move this document forward in the 
> > >> > > publication process.
> > >> > >
> > >> > > The updated files have been posted here (please refresh):
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.txt&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285743399%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=zpiUsd6Bt6EZCmIS7chaMiMa3rk1Yn%2B%2FIQMo7H647p0%3D&reserved=0
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.pdf&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285760588%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=nyVUtewyf3AGbb2dbq7%2Bfr68HjIf5m0vDXgylNbVjxE%3D&reserved=0
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285777479%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=mm22f7gz%2BTrDbADClFRwjg41MTP%2B%2BitEyBZ0c6vXtts%3D&reserved=0
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.xml&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285794491%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=J%2FlzKMZRHFatkzTqqZCmd0hPOsbez9i2Nh3SdcsgtXM%3D&reserved=0
> > >> > >
> > >> > > Diff files:
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285811972%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=2NQrJUOrmIiujMooznmCUgh2r0mOnyNFb41G16paXCs%3D&reserved=0
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-rfcdiff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285829366%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=f17tCKEZqsZAj1DkXsegCZ7G%2B1GzAOhmtDHZkNJSYag%3D&reserved=0
> > >> > >  (side by side)
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285853567%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=WseRvJy%2BAQHiLmNyEd%2B3vshoTegM%2BgSiki92%2F3N%2BzxQ%3D&reserved=0
> > >> > >    
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-auth48rfcdiff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285882037%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=65aW%2Fp8rF3%2BZS66fkjSe7eiPSkb%2FBH%2F1oU5QkoBTcBU%3D&reserved=0
> > >> > >  (side by side)
> > >> > >
> > >> > > For the AUTH48 status page, see: 
> > >> > > https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285900904%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=eIPvOZtpSnSLsU4lL8myrvj8HsuzL5AO6dSAwX6smiA%3D&reserved=0.
> > >> > >
> > >> > > Thank you!
> > >> > > Madison Church
> > >> > > RFC Production Center
> > >> > >
> > >> > > > On Feb 16, 2026, at 7:40 AM, Daniel Van Geest 
> > >> > > > <[email protected]> wrote:
> > >> > > >
> > >> > > > Responses inline
> > >> > > > On 2026-02-10 5:02 a.m., [email protected] wrote:
> > >> > > >> Authors,
> > >> > > >>
> > >> > > >> While reviewing this document during AUTH48, please resolve (as 
> > >> > > >> necessary)
> > >> > > >> the following questions, which are also in the source file.
> > >> > > >>
> > >> > > >> 1) <!-- [rfced] FYI: We have updated "Module Lattice Key 
> > >> > > >> Encapsulation
> > >> > > >> Mechanism" to "Module-Lattice-Based Key-Encapsulation Mechanism" 
> > >> > > >> to match
> > >> > > >> its use in NIST FIPS 203 and draft-ietf-lamps-kyber-certificates 
> > >> > > >> (and for
> > >> > > >> consistency with the Abstract). Please let us know any objections.
> > >> > > >>
> > >> > > >> Original:
> > >> > > >> The Module Lattice Key Encapsulation Mechanism (ML-KEM) is an
> > >> > > >> IND-CCA2-secure Key Encapsulation Mechanism (KEM) standardized in
> > >> > > >> [FIPS203] by the NIST PQC Project [NIST-PQ].
> > >> > > >>
> > >> > > >> Current:
> > >> > > >> The Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is 
> > >> > > >> an
> > >> > > >> IND-CCA2-secure Key Encapsulation Mechanism (KEM) standardized in
> > >> > > >> [FIPS203] by the NIST PQC Project [NIST-PQ].
> > >> > > >> -->
> > >> > > > Looks good
> > >> > > >>
> > >> > > >>
> > >> > > >>
> > >> > > >> 2) <!-- [rfced] FYI: We believe "MK-KEM-512" should be 
> > >> > > >> "ML-KEM-512". We
> > >> > > >> have corrected as follows.
> > >> > > >>
> > >> > > >> Original:
> > >> > > >> This document specifies the direct use of ML-KEM in the
> > >> > > >> KEMRecipientInfo structure using each of the three parameter sets 
> > >> > > >> from
> > >> > > >> [FIPS203], namely MK-KEM-512, ML-KEM-768, and ML-KEM-1024.
> > >> > > >>
> > >> > > >> Current:
> > >> > > >> This document specifies the direct use of ML-KEM
> > >> > > >> in the KEMRecipientInfo structure using each of the three 
> > >> > > >> parameter
> > >> > > >> sets from [FIPS203], namely ML-KEM-512, ML-KEM-768, and 
> > >> > > >> ML-KEM-1024.
> > >> > > >> -->
> > >> > > > Looks good
> > >> > > >>
> > >> > > >>
> > >> > > >> 3) <!-- [rfced] We have updated the following sentence since we 
> > >> > > >> fully
> > >> > > >> expanded HKDF. Please let us know any objections.
> > >> > > >>
> > >> > > >> Original:
> > >> > > >> Implementations MUST support HKDF [RFC5869] with SHA-256 
> > >> > > >> [FIPS180],
> > >> > > >> using the id-alg-hkdf-with-sha256 KDF object identifier [RFC8619].
> > >> > > >>
> > >> > > >> Current:
> > >> > > >> Implementations MUST support the HMAC-based Key Derivation 
> > >> > > >> Function
> > >> > > >> (HKDF) [RFC5869] with SHA-256 [FIPS180] using the id- 
> > >> > > >> alg-hkdf-with-
> > >> > > >> sha256 KDF object identifier [RFC8619].
> > >> > > >> -->
> > >> > > > Looks good
> > >> > > >>
> > >> > > >>
> > >> > > >> 4) <!-- [rfced] References
> > >> > > >>
> > >> > > >> a) FYI: We updated the date for [CSOR] from "20 August 2024" to 
> > >> > > >> "13
> > >> > > >> June 2025" to match the most current date provided at the URL.
> > >> > > >>
> > >> > > >> Original:
> > >> > > >> [CSOR] NIST, "Computer Security Objects Register", 20 August
> > >> > > >> 2024, 
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fcomputer-security-&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285918671%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=3MBUbxQsXYTIRpFb53iLPEkLVmCDZPSrb%2FcyJHgE2Pc%3D&reserved=0
> > >> > > >> objects-register/algorithm-registration>.
> > >> > > >>
> > >> > > >> Current:
> > >> > > >> [CSOR] NIST, "Computer Security Objects Register (CSOR)", 13 June
> > >> > > >> 2025, 
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fcomputer-security-&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285936461%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=q2nDr7ehOdYl0Wh97%2B%2FA5xpZb3u57%2FPdXMU%2F2XnG%2BMU%3D&reserved=0
> > >> > > >> objects-register/algorithm-registration>.
> > >> > > > Looks good
> > >> > > >>
> > >> > > >> b) FYI: We've updated the date for [NIST-PQ] from "20 December 
> > >> > > >> 2016" to
> > >> > > >> "30 September 2025" to match the most current date provided at 
> > >> > > >> the URL.
> > >> > > >>
> > >> > > >> Original:
> > >> > > >> [NIST-PQ] National Institute of Standards and Technology, "Post-
> > >> > > >> Quantum Cryptography Project", 20 December 2016,
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fpost-quantum-&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285953988%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=KE5aLG%2BBAFTqxtyShYBXG3tBomlA06FhZlwCHWEJsOE%3D&reserved=0
> > >> > > >> cryptography>.
> > >> > > >>
> > >> > > >> Current:
> > >> > > >> [NIST-PQ] NIST, "Post-Quantum Cryptography (PQC)", 30 September
> > >> > > >> 2025, 
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fpost-quantum-&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285971593%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=KNq9frRbUF4wR2Fmyb5HVE2Y7cCRoCoBiiRoZIEc8X0%3D&reserved=0
> > >> > > >> cryptography>.
> > >> > > > Looks good
> > >> > > >>
> > >> > > >>
> > >> > > >> c) FYI: We've updated the date for [CMVP] from "2016" to "3 
> > >> > > >> September
> > >> > > >> 2025" to match the most current date provided at the URL.
> > >> > > >>
> > >> > > >> Original:
> > >> > > >> [CMVP] National Institute of Standards and Technology,
> > >> > > >> "Cryptographic Module Validation Program", 2016,
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2Fcryptographic-module-&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502285988451%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=%2FUfkMZjDUqXDNpmhYC9SmIrKe9KPZKk9jdVq8zxNhxs%3D&reserved=0
> > >> > > >> validation-program>.
> > >> > > >>
> > >> > > >> Current:
> > >> > > >> [CMVP] NIST, "Cryptographic Module Validation Program (CMVP)", 3
> > >> > > >> September 2025, 
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcsrc.nist.gov%2Fprojects%2F&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286005621%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=wVxf5ehKNCu1mEtjgc0dy%2FLKg05RVgamDKrixY7EY3M%3D&reserved=0
> > >> > > >> cryptographic-module-validation-program>.
> > >> > > > Looks good
> > >> > > >>
> > >> > > >>
> > >> > > >> d) We note that draft-kampanakis-ml-kem-ikev2-09 has been 
> > >> > > >> replaced with
> > >> > > >> draft-ietf-ipsecme-ikev2-mlkem-03. We have updated the reference
> > >> > > >> accordingly. Please let us know if this is incorrect.
> > >> > > >> -->
> > >> > > > Looks good
> > >> > > >>
> > >> > > >>
> > >> > > >>
> > >> > > >> 5) <!-- [rfced] The following line exceeds the line limit by 3 
> > >> > > >> characters.
> > >> > > >> Please review and let us know how this line can be modified.
> > >> > > >>
> > >> > > >> 980 16: OCTET STRING 5C F1 78 6C 57 C7 40 2B 54 FC 93 C3 0A 4A 45 
> > >> > > >> 33
> > >> > > >>
> > >> > > >> -->
> > >> > > > The line can be wrapped.  I have re-run my dumpasn1 script with 
> > >> > > > tighter wrapping. For consistency this causes all of the hex lines 
> > >> > > > to be shifted left slightly. Here is the fully re-processed sample:
> > >> > > > NEW:
> > >> > > >      0 994: SEQUENCE {
> > >> > > >      4  11:  OBJECT IDENTIFIER
> > >> > > >           :   authEnvelopedData (1 2 840 113549 1 9 16 1 23)
> > >> > > >     17 977:  [0] {
> > >> > > >     21 973:   SEQUENCE {
> > >> > > >     25   1:    INTEGER 0
> > >> > > >     28 888:    SET {
> > >> > > >     32 884:     [4] {
> > >> > > >     36  11:      OBJECT IDENTIFIER '1 2 840 113549 1 9 16 13 3'
> > >> > > >     49 867:      SEQUENCE {
> > >> > > >     53   1:       INTEGER 0
> > >> > > >     56  20:       [0]
> > >> > > >           :    59 97 88 C3 7A ED 40 0E E4 05 D1 B2 A3 36 6A B1
> > >> > > >           :    7D 82 4A 51
> > >> > > >     78  11:       SEQUENCE {
> > >> > > >     80   9:        OBJECT IDENTIFIER '2 16 840 1 101 3 4 4 1'
> > >> > > >           :         }
> > >> > > >     91 768:       OCTET STRING
> > >> > > >           :    3E A4 0F C6 CA 09 0E 2C 8A F7 6E 27 27 AB 38 E0
> > >> > > >           :    65 2D 95 15 98 6F E1 86 82 7F E8 4E 59 6E 42 1B
> > >> > > >           :    85 FD 45 9C C7 89 97 37 2C 9D E3 1D 19 1B 39 C1
> > >> > > >           :    D5 A3 EB 6D DB 56 AA DE DE 76 5C C3 90 FD BB C2
> > >> > > >           :    F8 8C B1 75 68 1D 42 01 B8 1C CD FC B2 4F EF 13
> > >> > > >           :    AF 2F 5A 1A BC F8 D8 AF 38 4F 02 A0 10 A6 E9 19
> > >> > > >           :    F1 98 7A 5E 9B 1C 0E 2D 3F 07 F5 8A 9F A5 39 CE
> > >> > > >           :    86 CC 14 99 10 A1 69 2C 0C A4 CE 0E CE 4E EE D2
> > >> > > >           :    E6 69 9C B9 76 33 24 52 DE 4A 2E B5 CA 61 F7 B0
> > >> > > >           :    81 33 0C 34 79 8E F7 12 A2 4E 59 C3 3C EA 1F 1F
> > >> > > >           :    9E 6D 4F BF 37 43 A3 84 67 43 00 11 33 6F 62 D8
> > >> > > >           :    70 79 2B 86 6B EF CD 1D 1B 36 5B ED 19 52 67 3D
> > >> > > >           :    3A 5B 0C 20 B3 86 B4 EF D1 CF 63 FD 37 6B D4 7C
> > >> > > >           :    CC 46 AC 4D D8 EC 66 B0 47 C4 C9 5A CF F1 CF D0
> > >> > > >           :    28 A4 19 B0 02 FD A1 B6 17 CB A6 1D 2E 91 CF E8
> > >> > > >           :    FF FB CB 8F FD 4D 5F 6A D8 B1 58 C2 19 E3 6D C5
> > >> > > >           :    14 05 DC 0C 0B 23 49 79 AC 65 8E 72 BD DF 1B 67
> > >> > > >           :    73 B9 6B 2A E3 E4 D0 7B E8 60 48 04 0C 01 67 43
> > >> > > >           :    6F A8 39 E7 52 9B 00 CC 9A B5 5A 2F 25 DB 63 CC
> > >> > > >           :    9F 55 75 94 E6 91 C1 1E 55 3D 4A 3E BC 76 0F 5F
> > >> > > >           :    19 E5 FE 14 48 38 B4 C7 D1 59 1D A9 B5 D4 67 49
> > >> > > >           :    4F D9 CA C5 2C C5 50 40 60 39 9D BD B7 22 98 EB
> > >> > > >           :    9A 4C 01 7B 00 78 6F DC 7D 9D 7A A5 7A DB B8 B6
> > >> > > >           :    1C 34 DE 1E 28 8B 2A B7 28 17 1D CE 14 3C D1 69
> > >> > > >           :    53 F9 84 C1 AE D5 59 E5 6B AA 0C E6 58 D3 2C CE
> > >> > > >           :    42 F4 40 75 04 CD 7A 57 9A D0 EF 9B 77 13 5E AA
> > >> > > >           :    39 B6 F9 3A 3A 2E 59 97 80 7F 06 36 1C 83 F4 E6
> > >> > > >           :    7F 8E 3F 9C F6 83 16 01 15 14 F5 D8 5A 18 1C EA
> > >> > > >           :    D7 14 CD 49 40 E4 EB AC 01 D6 65 28 DA 32 F8 9C
> > >> > > >           :    EA 04 28 E8 EB CA DC F8 AA 18 8C 9F 62 E8 5B 19
> > >> > > >           :    57 65 5B 7F E2 B8 D7 97 3B 7A 72 26 B6 6D 93 BF
> > >> > > >           :    7B 23 2F 3D CF 65 3C 84 B4 EC F1 A9 92 0D B1 94
> > >> > > >           :    9A D7 50 B5 46 A5 55 2A 20 E5 49 09 71 9B 8C 0C
> > >> > > >           :    07 05 6F CB 7E 57 4A D2 A3 2E C9 50 01 DD E8 44
> > >> > > >           :    81 BE 77 D0 39 ED 5B F7 42 62 EC F3 98 1F 1B 00
> > >> > > >           :    D3 36 6A 9C 2E 06 1C 47 E2 41 A0 61 C6 24 95 60
> > >> > > >           :    D2 B8 44 6A 48 0C 38 C2 8B A9 89 D9 F6 8A DC 4B
> > >> > > >           :    BA F2 A2 0B 47 E4 92 31 28 C7 23 42 D5 97 FD A2
> > >> > > >           :    59 DE 0B 83 C2 05 6D 6B 77 E7 99 B3 19 32 4A A5
> > >> > > >           :    0B 1D 65 9C 2A 56 02 9B 74 53 C5 F3 BA 52 43 D9
> > >> > > >           :    FA 74 9D 91 7C 40 D9 D1 01 E4 53 BC 8B 10 E4 2A
> > >> > > >           :    7C 08 93 23 C0 26 F7 83 E1 00 B9 FA 6E 70 14 42
> > >> > > >           :    4D A6 FA 37 92 BC 95 7E E8 21 9D 01 6B 77 3F 28
> > >> > > >           :    FE DC C9 62 A4 85 AB AF FE C0 23 28 19 71 E2 9A
> > >> > > >           :    A6 89 83 9E CF D2 61 9E 92 28 7C D2 30 DB 26 A2
> > >> > > >           :    50 7C C5 00 EB 1C 7A 52 93 B5 FE 91 7A E2 9B F1
> > >> > > >           :    AD 35 01 24 F8 A3 11 63 52 14 B4 11 DB 9F 67 D3
> > >> > > >           :    B8 5B D7 15 01 85 37 EA 45 B4 1F 41 B4 C6 60 51
> > >> > > >    863  13:       SEQUENCE {
> > >> > > >    865  11:        OBJECT IDENTIFIER
> > >> > > >           :         hkdfWithSha256 (1 2 840 113549 1 9 16 3 28)
> > >> > > >           :         }
> > >> > > >    878   1:       INTEGER 16
> > >> > > >    881  11:       SEQUENCE {
> > >> > > >    883   9:        OBJECT IDENTIFIER
> > >> > > >           :         aes128-wrap (2 16 840 1 101 3 4 1 5)
> > >> > > >           :         }
> > >> > > >    894  24:       OCTET STRING
> > >> > > >           :    C0 50 E4 39 2F 9C 14 DD 0A C2 22 02 03 F3 17 D7
> > >> > > >           :    01 F9 4F 9D D9 27 78 F5
> > >> > > >           :        }
> > >> > > >           :       }
> > >> > > >           :      }
> > >> > > >    920  58:    SEQUENCE {
> > >> > > >    922   9:     OBJECT IDENTIFIER data (1 2 840 113549 1 7 1)
> > >> > > >    933  30:     SEQUENCE {
> > >> > > >    935   9:      OBJECT IDENTIFIER
> > >> > > >           :       aes128-GCM (2 16 840 1 101 3 4 1 6)
> > >> > > >    946  17:      SEQUENCE {
> > >> > > >    948  12:       OCTET STRING 5C A5 74 68 B8 1B F0 3B 8D A7 18 6C
> > >> > > >    962   1:       INTEGER 16
> > >> > > >           :        }
> > >> > > >           :       }
> > >> > > >    965  13:     [0] 94 C8 68 9A 99 D2 C3 8E 19 2F A6 BA 08
> > >> > > >           :      }
> > >> > > >    980  16:    OCTET STRING
> > >> > > >           :    5C F1 78 6C 57 C7 40 2B 54 FC 93 C3 0A 4A 45 33
> > >> > > >           :     }
> > >> > > >           :    }
> > >> > > >           :   }
> > >> > > >
> > >> > > >>
> > >> > > >> 6) <!-- [rfced] The following was provided in response to the 
> > >> > > >> intake form:
> > >> > > >>
> > >> > > >> Acknowledgements should maybe mention 
> > >> > > >> draft-ietf-lamps-kyber-certificates.
> > >> > > >> There is an Informative reference to I-D.kampanakis-ml-kem-ikev2 
> > >> > > >> which is only referenced from the Acknowledgements section. That 
> > >> > > >> s polite, but if this RFC will be delayed waiting for the other 
> > >> > > >> one, then it can be removed.
> > >> > > >>
> > >> > > >> Please provide text if you would like to update the 
> > >> > > >> Acknowledgements
> > >> > > >> section. Note that draft-ietf-lamps-kyber-certificates is now in 
> > >> > > >> AUTH48 as
> > >> > > >> RFC-to-be 9935.
> > >> > > >> -->
> > >> > > > The first paragraph of the acknowledgements section can be updated 
> > >> > > > as follows to mention RFC9935.  As this is just an 
> > >> > > > acknowledgement, I don't think draft would be delayed waiting on 
> > >> > > > kampanakis-ml-kem-ikev2.  If that's the case, we can change the 
> > >> > > > text further.
> > >> > > > NEW:
> > >> > > >    This document borrows heavily from [RFC9690], [FIPS203], 
> > >> > > > [RFC9935],
> > >> > > >    and [I-D.ietf-ipsecme-ikev2-mlkem].  Thanks go to the authors of
> > >> > > >    those documents.  "Copying always makes things easier and less 
> > >> > > > error
> > >> > > >    prone" - RFC8411.
> > >> > > >>
> > >> > > >> 7) <!-- [rfced] FYI - We updated artwork elements to sourcecode 
> > >> > > >> per the
> > >> > > >> guidance given in the document intake form:
> > >> > > >>
> > >> > > >> "...the two-line code block in section 2.2.1, the identifiers in 
> > >> > > >> section 3
> > >> > > >> and especially the sample data in Appendix C."
> > >> > > >>
> > >> > > >> A) Please review and let us know if any other artwork elements 
> > >> > > >> need to be
> > >> > > >> marked as sourcecode.
> > >> > > > No additional artworks need to be marked as sourcecode.
> > >> > > >>
> > >> > > >> B) Please review the current list of preferred values for 
> > >> > > >> sourcecode "type"
> > >> > > >> (https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Frpc%2Fwiki%2Fdoku.php%3Fid%3Dsourcecode-types&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286024572%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=PLq%2FXn44N2vZxFMdK1m9eaWYHoGDH2mXJrDBEPNBLXo%3D&reserved=0)
> > >> > > >> and let us know how/if type should be set. If the list does not 
> > >> > > >> contain an
> > >> > > >> applicable type, then feel free to let us know. Also, note that 
> > >> > > >> it is
> > >> > > >> acceptable to leave the "type" attribute not set.
> > >> > > >> -->
> > >> > > > These are the appropriate types:
> > >> > > > Section 2.2.1: pseudocode
> > >> > > > Section 3: asn.1
> > >> > > > Appendix C: test-vectors
> > >> > > >>
> > >> > > >> 8) <!-- [rfced] We have added expansions for abbreviations 
> > >> > > >> throughout the
> > >> > > >> document and use abbreviated forms for expansions upon first use. 
> > >> > > >> Please
> > >> > > >> let us know any objections.
> > >> > > >> -->
> > >> > > > Looks good
> > >> > > >>
> > >> > > >>
> > >> > > >> 9) <!-- [rfced] Please review the "Inclusive Language" portion of 
> > >> > > >> the
> > >> > > >> online Style Guide 
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fstyleguide%2Fpart2%2F%23inclusive_language&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286043494%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=JwIlUdcc8EFt7KmWAZfaJjvpBBXb3cEOImhSJBs15Dw%3D&reserved=0>
> > >> > > >> and let us know if any changes are needed. Updates of this nature
> > >> > > >> typically result in more precise language, which is helpful for 
> > >> > > >> readers.
> > >> > > >>
> > >> > > >> Note that our script did not flag any words in particular, but 
> > >> > > >> this should
> > >> > > >> still be reviewed as a best practice.
> > >> > > >>
> > >> > > >> In addition, please consider whether "tradition" should be 
> > >> > > >> updated for
> > >> > > >> clarity. While the NIST website
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fweb.archive.org%2Fweb%2F20250214092458%2Fhttps%3A%2F%2Fwww.nist.gov%2Fnist-research-library%2Fnist-technical-series-publications-author-instructions%23table1&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286060718%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=D%2BsaZm17kG7LsuArdLhCUwCoPOnKjxZYGYscaXIa0EE%3D&reserved=0>
> > >> > > >> indicates that this term is potentially biased, it is also 
> > >> > > >> ambiguous.
> > >> > > >> "Tradition" is a subjective term, as it is not the same for 
> > >> > > >> everyone.
> > >> > > >> Possible substitutions for "traditional" (used in past RFCs) 
> > >> > > >> include
> > >> > > >> "commonly used", "typical", "long-established", "conventional", 
> > >> > > >> and
> > >> > > >> "time-honored". -->
> > >> > > > This question can be sidestepped by removing "traditional" 
> > >> > > > entirely:
> > >> > > > OLD:
> > >> > > >    Instead of defining the strength of a quantum algorithm in a
> > >> > > >    traditional manner using the imprecise notion of bits of 
> > >> > > > security,
> > >> > > > NEW:
> > >> > > >    Instead of defining the strength of a quantum algorithm using 
> > >> > > > the
> > >> > > >    imprecise notion of bits of security,
> > >> > > >>
> > >> > > >> Thank you.
> > >> > > >> Madison Church and Sandy Ginoza
> > >> > > >> RFC Production Center
> > >> > > > Thanks,
> > >> > > > Daniel
> > >> > > >>
> > >> > > >>
> > >> > > >> On Feb 9, 2026, at 8:59 PM, [email protected] wrote:
> > >> > > >>
> > >> > > >> *****IMPORTANT*****
> > >> > > >>
> > >> > > >> Updated 2026/02/09
> > >> > > >>
> > >> > > >> RFC Author(s):
> > >> > > >> --------------
> > >> > > >>
> > >> > > >> Instructions for Completing AUTH48
> > >> > > >>
> > >> > > >> Your document has now entered AUTH48. Once it has been reviewed 
> > >> > > >> and
> > >> > > >> approved by you and all coauthors, it will be published as an RFC.
> > >> > > >> If an author is no longer available, there are several remedies
> > >> > > >> available as listed in the FAQ 
> > >> > > >> (https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Ffaq%2F&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286078005%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=o%2BtiOefxXmUks0zu6CB7siJHab7JRMAnQMxavLLT20M%3D&reserved=0).
> > >> > > >>
> > >> > > >> You and you coauthors are responsible for engaging other parties
> > >> > > >> (e.g., Contributors or Working Group) as necessary before 
> > >> > > >> providing
> > >> > > >> your approval.
> > >> > > >>
> > >> > > >> Planning your review
> > >> > > >> ---------------------
> > >> > > >>
> > >> > > >> Please review the following aspects of your document:
> > >> > > >>
> > >> > > >> * RFC Editor questions
> > >> > > >>
> > >> > > >> Please review and resolve any questions raised by the RFC Editor
> > >> > > >> that have been included in the XML file as comments marked as
> > >> > > >> follows:
> > >> > > >>
> > >> > > >> <!-- [rfced] ... -->
> > >> > > >>
> > >> > > >> These questions will also be sent in a subsequent email.
> > >> > > >>
> > >> > > >> * Changes submitted by coauthors
> > >> > > >>
> > >> > > >> Please ensure that you review any changes submitted by your
> > >> > > >> coauthors. We assume that if you do not speak up that you
> > >> > > >> agree to changes submitted by your coauthors.
> > >> > > >>
> > >> > > >> * Content
> > >> > > >>
> > >> > > >> Please review the full content of the document, as this cannot
> > >> > > >> change once the RFC is published. Please pay particular attention 
> > >> > > >> to:
> > >> > > >> - IANA considerations updates (if applicable)
> > >> > > >> - contact information
> > >> > > >> - references
> > >> > > >>
> > >> > > >> * Copyright notices and legends
> > >> > > >>
> > >> > > >> Please review the copyright notice and legends as defined in
> > >> > > >> RFC 5378 and the Trust Legal Provisions
> > >> > > >> (TLP – 
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftrustee.ietf.org%2Flicense-info&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286094743%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=Ezau7mn5K0fDXvLeEqxbbgso5qNhMCkdSrTQK%2BT3TFk%3D&reserved=0).
> > >> > > >>
> > >> > > >> * Semantic markup
> > >> > > >>
> > >> > > >> Please review the markup in the XML file to ensure that elements 
> > >> > > >> of
> > >> > > >> content are correctly tagged. For example, ensure that 
> > >> > > >> <sourcecode>
> > >> > > >> and <artwork> are set correctly. See details at
> > >> > > >> <https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fauthors.ietf.org%2Frfcxml-vocabulary&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286111503%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=%2FFdfaTWhYrpFO8c7D6G5%2Fm5ZsYPmwhYpcrpMTSmu0cE%3D&reserved=0>.
> > >> > > >>
> > >> > > >> * Formatted output
> > >> > > >>
> > >> > > >> Please review the PDF, HTML, and TXT files to ensure that the
> > >> > > >> formatted output, as generated from the markup in the XML file, is
> > >> > > >> reasonable. Please note that the TXT will have formatting
> > >> > > >> limitations compared to the PDF and HTML.
> > >> > > >>
> > >> > > >>
> > >> > > >> Submitting changes
> > >> > > >> ------------------
> > >> > > >>
> > >> > > >> To submit changes, please reply to this email using ‘REPLY ALL’ 
> > >> > > >> as all
> > >> > > >> the parties CCed on this message need to see your changes. The 
> > >> > > >> parties
> > >> > > >> include:
> > >> > > >>
> > >> > > >> * your coauthors
> > >> > > >>
> > >> > > >> * [email protected] (the RPC team)
> > >> > > >>
> > >> > > >> * other document participants, depending on the stream (e.g.,
> > >> > > >> IETF Stream participants are your working group chairs, the
> > >> > > >> responsible ADs, and the document shepherd).
> > >> > > >>
> > >> > > >> * [email protected], which is a new archival mailing 
> > >> > > >> list
> > >> > > >> to preserve AUTH48 conversations; it is not an active discussion
> > >> > > >> list:
> > >> > > >>
> > >> > > >> * More info:
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fmsg%2Fietf-announce%2Fyb6lpIGh-4Q9l2USxIAe6P8O4Zc&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286128158%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=8O4N5ZJtgRNRpL9iOWAlAptm8NAqDhdxiSG%2ByKqf%2FcY%3D&reserved=0
> > >> > > >>
> > >> > > >> * The archive itself:
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmailarchive.ietf.org%2Farch%2Fbrowse%2Fauth48archive%2F&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286144964%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=16dd0QZAxwGscjj2JQZ656LDWXZ9HOps5o23x%2B2rXYI%3D&reserved=0
> > >> > > >>
> > >> > > >> * Note: If only absolutely necessary, you may temporarily opt out
> > >> > > >> of the archiving of messages (e.g., to discuss a sensitive 
> > >> > > >> matter).
> > >> > > >> If needed, please add a note at the top of the message that you
> > >> > > >> have dropped the address. When the discussion is concluded,
> > >> > > >> [email protected] will be re-added to the CC list and
> > >> > > >> its addition will be noted at the top of the message.
> > >> > > >>
> > >> > > >> You may submit your changes in one of two ways:
> > >> > > >>
> > >> > > >> An update to the provided XML file
> > >> > > >> — OR —
> > >> > > >> An explicit list of changes in this format
> > >> > > >>
> > >> > > >> Section # (or indicate Global)
> > >> > > >>
> > >> > > >> OLD:
> > >> > > >> old text
> > >> > > >>
> > >> > > >> NEW:
> > >> > > >> new text
> > >> > > >>
> > >> > > >> You do not need to reply with both an updated XML file and an 
> > >> > > >> explicit
> > >> > > >> list of changes, as either form is sufficient.
> > >> > > >>
> > >> > > >> We will ask a stream manager to review and approve any changes 
> > >> > > >> that seem
> > >> > > >> beyond editorial in nature, e.g., addition of new text, deletion 
> > >> > > >> of text,
> > >> > > >> and technical changes. Information about stream managers can be 
> > >> > > >> found in
> > >> > > >> the FAQ. Editorial changes do not require approval from a stream 
> > >> > > >> manager.
> > >> > > >>
> > >> > > >>
> > >> > > >> Approving for publication
> > >> > > >> --------------------------
> > >> > > >>
> > >> > > >> To approve your RFC for publication, please reply to this email 
> > >> > > >> stating
> > >> > > >> that you approve this RFC for publication. Please use ‘REPLY ALL’,
> > >> > > >> as all the parties CCed on this message need to see your approval.
> > >> > > >>
> > >> > > >>
> > >> > > >> Files
> > >> > > >> -----
> > >> > > >>
> > >> > > >> The files are available here:
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.xml&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286161521%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=JAi68%2Fh3iMsx7jQBhKcykYbO7g1jddwgs5z8YO7UxoQ%3D&reserved=0
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286182657%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=SYMbuBmXfkuvEygALHGtCAmTdjEHYhsm7k7wkGmwLDc%3D&reserved=0
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.pdf&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286201716%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=VkaxMwyohRHyLDt9dAEZdW2ACd1uwiQ30tKZxN9k0fI%3D&reserved=0
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936.txt&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286219416%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=pYdfSRUSMnQgoxonkqsqAAvMbtVPbA4zYi3mK7DPp8M%3D&reserved=0
> > >> > > >>
> > >> > > >> Diff file of the text:
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-diff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286237495%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=ytJAzXyFT0AdKYHhPFQABwn5FHLyxhcrfVAsoCeRkoE%3D&reserved=0
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-rfcdiff.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286256165%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=nQI9PX9bMRBpjfWH8VM8iFpFJRE1D4rmvXlCMC4lNgE%3D&reserved=0
> > >> > > >>  (side by side)
> > >> > > >>
> > >> > > >> Diff of the XML:
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauthors%2Frfc9936-xmldiff1.html&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286273384%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=N1tmIQfl5u6%2F3OUPQjHGE0Fkw%2BeIZKXS0MXyDJ9uftE%3D&reserved=0
> > >> > > >>
> > >> > > >>
> > >> > > >> Tracking progress
> > >> > > >> -----------------
> > >> > > >>
> > >> > > >> The details of the AUTH48 status of your document are here:
> > >> > > >> https://fra01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.rfc-editor.org%2Fauth48%2Frfc9936&data=05%7C02%7Cjulien.prat%40cryptonext-security.com%7Ca0f7fd6350c64a4c77c808de73c8875a%7Cda4a2df14b1b489da7f4224b58fd4200%7C0%7C0%7C639075502286290342%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C&sdata=lmNA5j4BjiKpvSzqy8NavsRQab1HolRayD9YgBb68m8%3D&reserved=0
> > >> > > >>
> > >> > > >> Please let us know if you have any questions.
> > >> > > >>
> > >> > > >> Thank you for your cooperation,
> > >> > > >>
> > >> > > >> RFC Editor
> > >> > > >>
> > >> > > >> --------------------------------------
> > >> > > >> RFC 9936 (draft-ietf-lamps-cms-kyber-13)
> > >> > > >>
> > >> > > >> Title : Use of ML-KEM in the Cryptographic Message Syntax (CMS)
> > >> > > >> Author(s) : P. Julien, M. Ounsworth, D. Van Geest
> > >> > > >> WG Chair(s) : Russ Housley, Tim Hollebeek
> > >> > > >> Area Director(s) : Deb Cooley, Paul Wouters
> > >> >
> > >> >
> > >>
> > >
> > 
> > 

-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to