{"id":"https://openalex.org/W2926224595","doi":"https://doi.org/10.17487/rfc9054","title":"CBOR Object Signing and Encryption (COSE): Hash Algorithms","display_name":"CBOR Object Signing and Encryption (COSE): Hash Algorithms","publication_year":2022,"publication_date":"2022-08-01","ids":{"openalex":"https://openalex.org/W2926224595","doi":"https://doi.org/10.17487/rfc9054","mag":"2926224595"},"language":"en","primary_location":{"id":"doi:10.17487/rfc9054","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc9054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"},"type":"report","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054450856","display_name":"J. Schaad","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"J. Schaad","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5054450856"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7083913087844849},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6728233695030212},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6719456315040588},{"id":"https://openalex.org/keywords/object","display_name":"Object (grammar)","score":0.5318745374679565},{"id":"https://openalex.org/keywords/secure-hash-algorithm","display_name":"Secure Hash Algorithm","score":0.46059998869895935},{"id":"https://openalex.org/keywords/sha-2","display_name":"SHA-2","score":0.39413607120513916},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.36356085538864136},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.35942649841308594},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.3504539728164673},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20378705859184265},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13900607824325562}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7083913087844849},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6728233695030212},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6719456315040588},{"id":"https://openalex.org/C2781238097","wikidata":"https://www.wikidata.org/wiki/Q175026","display_name":"Object (grammar)","level":2,"score":0.5318745374679565},{"id":"https://openalex.org/C9661340","wikidata":"https://www.wikidata.org/wiki/Q257799","display_name":"Secure Hash Algorithm","level":5,"score":0.46059998869895935},{"id":"https://openalex.org/C190157925","wikidata":"https://www.wikidata.org/wiki/Q1968605","display_name":"SHA-2","level":4,"score":0.39413607120513916},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36356085538864136},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.35942649841308594},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.3504539728164673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20378705859184265},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13900607824325562}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.17487/rfc9054","is_oa":false,"landing_page_url":"https://doi.org/10.17487/rfc9054","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":null,"raw_type":"report"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2776620167","https://openalex.org/W2792719764","https://openalex.org/W2945043874","https://openalex.org/W4250335156","https://openalex.org/W4225555936","https://openalex.org/W2985918614","https://openalex.org/W2361726911","https://openalex.org/W1672978577","https://openalex.org/W3171652909","https://openalex.org/W2375657734"],"abstract_inverted_index":{"The":[0],"CBOR":[1],"Object":[2],"Signing":[3],"and":[4],"Encryption":[5],"(COSE)":[6],"syntax":[7],"[I-D.ietf-cose-\nrfc8152bis-struct]":[8],"does":[9],"not":[10],"define":[11],"any":[12],"direct":[13],"methods":[14],"for":[15],"using":[16],"hash\nalgorithms.":[17],"There":[18],"are":[19],"however":[20],"circumstances":[21],"where":[22,28],"hash":[23,30,54],"algorithms":[24,55],"are\nused:":[25],"Indirect":[26],"signatures":[27],"the":[29,44],"of":[31,53],"one":[32],"or":[33,39],"more":[34],"contents":[35],"are\nsigned.":[36],"X.509":[37],"certificate":[38],"other":[40],"object":[41],"identification":[42],"by":[43,58],"use":[45],"of\na":[46],"thumbprint.":[47],"This":[48],"document":[49],"defines":[50],"a":[51],"set":[52],"that":[56],"are\nidentified":[57],"COSE":[59],"Algorithm":[60],"Identifiers.":[61]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
