Elise Revell

Learn More
—In this work, we initially describe a method patented in [1] for key generation in a symmetric channel between different nodes that are located within a trusted network. In the aftermath, we describe the different phases of the invented method in cryptographic terms and we analyze security aspects with respect to a proper implementation. We conclude by(More)
  • 1