[1]
J. Pijnenburg and B. Poettering, “Key Assignment Schemes with Authenticated Encryption, revisited”, ToSC, vol. 2020, no. 2, pp. 40-67, Jul. 2020.