Springer, Journal of Cryptology, 3(28), p. 718-744, 2013
DOI: 10.1007/s00145-013-9175-4
Springer, Lecture Notes in Computer Science, p. 71-91, 2014
DOI: 10.1007/978-3-662-43933-3_5
Export citation
Search in Google Scholar
Full text: Unavailable