Learn More
In this work, we initially describe a method patented in cite{Revell2012} for key generation in a symmetric channel between different nodes that are located within a trusted network. In the aftermath, we describe the different phases of the invented method in cryptographic terms and we analyze security aspects with respect to a proper implementation. We(More)
  • 1