1.
Pijnenburg J, Poettering B. Key Assignment Schemes with Authenticated Encryption, revisited. ToSC [Internet]. 2020 Jul. 24 [cited 2025 Jan. 18];2020(2):40-67. Available from: https://icscm.ub.rub.de/index.php/ToSC/article/view/8668