Springer, Journal of Cryptology, 2(30), p. 519-549, 2016
DOI: 10.1007/s00145-016-9229-5
Export citation
Search in Google Scholar
Full text: Unavailable