[1]
“Tight Security Analysis of EHtM MAC”, ToSC, vol. 2017, no. 3, pp. 130–150, Sep. 2017, doi: 10.13154/tosc.v2017.i3.130-150.