Springer, Journal of Cryptology, 3(30), p. 859-888, 2016
DOI: 10.1007/s00145-016-9237-5
Springer Verlag, Lecture Notes in Computer Science, p. 411-430
DOI: 10.1007/978-3-662-46706-0_21
Export citation
Search in Google Scholar
Full text: Unavailable