H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed- Hashing for Message Authentication, 1997.
DOI : 10.17487/rfc2104

S. Bradner, Key words for use in RFCs to Indicate Requirement Levels, 1997.
DOI : 10.17487/rfc2119

J. Jonsson and B. Kaliski, Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2, RFC, vol.3447, issue.1, 2003.
DOI : 10.17487/rfc3447

. Briscoe, Timed Efficient Stream Loss-Tolerant Authentication (TESLA): Multicast Source Authentication Transform Introduction, RFC, vol.4082, 2005.

B. Weis, The Use of RSA/SHA-1 Signatures within Encapsulating Security Payload (ESP) and Authentication Header (AH), RFC, vol.4359, 2006.
DOI : 10.17487/rfc4359

D. Fu and J. Solinas, IKE and IKEv2 Authentication Using the Elliptic Curve Digital Signature Algorithm (ECDSA), RFC, vol.4754, 2007.
DOI : 10.17487/rfc4754

. Polk, Elliptic Curve Cryptography Subject Public Key Information, RFC, vol.5480, 2009.

B. Ramsdell and S. Turner, Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification, RFC, vol.5751, 2010.
DOI : 10.17487/rfc5751

V. Roca, A. Francillon, and S. Faurite, Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA) in the Asynchronous Layered Coding (ALC) and NACK-Oriented Reliable Multicast (NORM) Protocols, RFC, vol.5776, 2010.
DOI : 10.17487/rfc5776

D. Mcgrew, K. Igoe, and M. Salter, Fundamental Elliptic Curve Cryptography Algorithms, RFC, vol.6090, 2011.
DOI : 10.17487/rfc6090

[. Paila, T. Walsh, R. Luby, M. Roca, V. et al., FLUTE -File Delivery over Unidirectional Transport, Progress, 2012.
DOI : 10.17487/rfc6726

URL : https://hal.archives-ouvertes.fr/hal-00749951