<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.deng-sec-dnsec-alg" target="https://datatracker.ietf.org/doc/html/draft-deng-sec-dnsec-alg-00">
   <front>
      <title>Use of SM2 and SM3 algorithms in DNSKEY and RRSIG Resource Records for
DNSSEC</title>
      <author initials="G." surname="Deng" fullname="Guangqing Deng">
         <organization>CNNIC</organization>
      </author>
      <author initials="S." surname="Shen" fullname="Sean Shen">
         <organization>CNNIC</organization>
      </author>
      <author initials="N." surname="Kong" fullname="Ning Kong">
         <organization>CNNIC</organization>
      </author>
      <date month="October" day="15" year="2012" />
      <abstract>
	 <t>   This document describes how to generate signature and hash using SM2
   and SM3 algorithms for DNSKEY, RRSIG and DS resource records in
   Domain Name System Security Extensions (DNSSEC).
	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-deng-sec-dnsec-alg-00" />
   
</reference>
