We concentrated on building key distribution and authentication … with only pseudo-random one-way functions [ref] … [p. 735] The [KryptoKnight] protocols presented in this paper … We circumvent some limitations of existing designs by … sizes and cryptographic operations, assuring scalability, and staying … suitable for low-end devices with limited memory and …
Google-1
Google-2
Copyright clearance needed for quotation.