[1]
O. Verba and I. Daiko, “Method for cryptographically strict identification with password reuse blocking ”, PIC, vol. 2, no. 78, pp. 4–13, Jul. 2024.