[1]
“Key Assignment Schemes with Authenticated Encryption, revisited”, ToSC, vol. 2020, no. 2, pp. 40–67, Jul. 2020, doi: 10.13154/tosc.v2020.i2.40-67.