1.
Pijnenburg J, Poettering B. Key Assignment Schemes with Authenticated Encryption, revisited. ToSC [Internet]. 2020 Jul. 24 [cited 2025 May 24];2020(2):40-67. Available from: https://tches.iacr.org/index.php/ToSC/article/view/8668