APA (7th ed.) Citation

Kim, S., Lewi, K., Mandal, A., Montgomery, H., Roy, A., & Wu, D. J. (2018). Function-Hiding Inner Product Encryption Is Practical. Security and Cryptography for Networks, 11035, 544-562. https://doi.org/10.1007/978-3-319-98113-0_29

Chicago Style (17th ed.) Citation

Kim, Sam, Kevin Lewi, Avradip Mandal, Hart Montgomery, Arnab Roy, and David J. Wu. "Function-Hiding Inner Product Encryption Is Practical." Security and Cryptography for Networks 11035 (2018): 544-562. https://doi.org/10.1007/978-3-319-98113-0_29.

MLA (9th ed.) Citation

Kim, Sam, et al. "Function-Hiding Inner Product Encryption Is Practical." Security and Cryptography for Networks, vol. 11035, 2018, pp. 544-562, https://doi.org/10.1007/978-3-319-98113-0_29.

Warning: These citations may not always be 100% accurate.