[1]
J. Pijnenburg and B. Poettering, “Key Assignment Schemes with Authenticated Encryption, revisited”, ToSC, vol. 2020, no. 2, pp. 40–67, Jul. 2020.