1. Barker, E. et al. Recommendation for pair-wise key-establishment schemes using discrete logarithm cryptography. NIST, Computer Security Resource Center (Apr. 2018); https://csrc.nist.gov/publications/detail/sp/800-56a/rev-3/final.
2. Concise Binary Object Representation (CBOR)
3. Recommendation for Key Derivation Using Pseudorandom Functions
4. DNS-Based Service Discovery
5. Cooper, D. et al. X.509 Certificate and Certificate Revocation List (CRL) profile, RFC 5280. IETF, 2008; https://www.ietf.org/rfc/rfc5280.txt.