Dear Authors,
draft-fossati-tls-iot-optimizations-00 mentions in 4.2, page 5, a hash chain
(Lampert, "Password Authentication with Insecure Communication").
Would it be possible, to get more details about that approach?
In my opinion, DTLS needs a connection id, the record is usually secured b
Hi,
I'm still wondering, why the "clashing" calculations (section 4) are only based
on the number of clients and not also on the length of the hash chain.
As I understood the hash chain, the DTLS server and client calculates a list of
CIDs. Though the client chose one, the server has to prepare