1.
Pijnenburg J, Poettering B. Key Assignment Schemes with Authenticated Encryption, revisited. ToSC [Internet]. 2020Jul.24 [cited 2020Aug.8];2020(2):40-7. Available from: https://tosc.iacr.org/index.php/ToSC/article/view/8668