1. 7

  2. 2

    The link to the paper on this website was weird for me. Here is another link to the paper, in case that one is paywalled for you too.

    1. 1

      I glanced through the paper, and noted that the security it provides only offers integrity by default, supports authenticity (though the public key signature component was a bit hazy), and doesn’t provide confidentiality. The signature algorithm wasn’t specified, and it isn’t immediately obvious how one selects a public key. Anyone take a more in-depth look at it?