Rhee, K.-H.2022-03-022022-03-0220113-642-24208-1978-3-642-24208-3978-3-642-24209-0https://publica.fraunhofer.de/handle/publica/152691Information security and cryptology, ICISC 2010. Revised selected papers