Springer, Journal of Cryptology, 2(24), p. 269-291, 2010
DOI: 10.1007/s00145-010-9084-8
Export citation
Search in Google Scholar
Full text: Download