https://www.cisoplatform.com/profiles/blogs/cryptographic-protocols-practical-revocation-and-key-rotation?xg_source=telegram
Checking out "Cryptographic Protocols: Practical revocation and key rotation" on CISO Platform: