A Verifiable Random Function (VRF) is the public key version of a keyed cryptographic hash. Only the holder of the secret key can
The PIM version 2 messages share a common message header format. The common header definition contains eight reserved bits. This document
This document specifies how Automated Certificate Management Environment (ACME) can be used by a client to obtain a certificate
The wireless medium presents significant specific challenges to achieve properties similar to those of wired deterministic networks.
The JSON Meta Application Protocol (JMAP) base protocol (RFC 8620) provides the ability to upload and download arbitrary binary data via
This document specifies two new Remote Authentication Dial-In User Service (RADIUS) attributes that carry DHCP options. The
This document updates some OSPF terminology to be in line with inclusive language used in the industry. The IETF has designated
This document specifies a number of algorithms for encoding or hashing an arbitrary string to a point on an elliptic curve. This
CUBIC is a standard TCP congestion control algorithm that uses a cubic function instead of a linear congestion window increase
The cost metric is a basic concept in Application-Layer Traffic Optimization (ALTO), and different applications may use different