5.1 Security Considerations for Implementers
There are no additional security considerations. Security assumptions for this protocol are documented in section 1.5.
There are no additional security considerations. Security assumptions for this protocol are documented in section 1.5.