1. J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. Request for Comments: 4880. https://datatracker.ietf.org/doc/html/rfc4880 J. Callas L. Donnerhacke H. Finney D. Shaw and R. Thayer. 2007. Request for Comments: 4880. https://datatracker.ietf.org/doc/html/rfc4880
2. Konstantinos Chalkias , Francc ois Garillot, and Valeria Nikolaenko . 2020 . Taming the Many EdDSAs. In Security Standardisation Research . Konstantinos Chalkias, Francc ois Garillot, and Valeria Nikolaenko. 2020. Taming the Many EdDSAs. In Security Standardisation Research.
3. M. Crispin. 2003. Request for Comments: 3501. https://datatracker.ietf.org/doc/html/rfc3501#section-5.1.3 M. Crispin. 2003. Request for Comments: 3501. https://datatracker.ietf.org/doc/html/rfc3501#section-5.1.3
4. Kevin Fiscus. 2011. Base64 Can Get You Pwned. https://www.sans.org/white-papers/33759/ Kevin Fiscus. 2011. Base64 Can Get You Pwned. https://www.sans.org/white-papers/33759/
5. N. Freed and N. Borenstein. 1996. Request for Comments: 2045. https://datatracker.ietf.org/doc/html/rfc2045#page-24 N. Freed and N. Borenstein. 1996. Request for Comments: 2045. https://datatracker.ietf.org/doc/html/rfc2045#page-24