Cryptology ePrint Archive: Report 2015/486
Available versions in chronological order
20150521:201012 (posted 21-May-2015 20:10:12 UTC)
How to detect unauthorised usage of a key
Jiangshan Yu and Mark Ryan and Cas Cremers
[
Cryptology ePrint archive
]