1.
Pijnenburg J, Poettering B. Key Assignment Schemes with Authenticated Encryption, revisited. ToSC [Internet]. 2020 Jul. 24 [cited 2024 Mar. 28];2020(2):40-67. Available from: https://tosc.iacr.org/index.php/ToSC/article/view/8668