An effective defense against first party attacks in public-key algorithmsStephen M. MatyasAllen Roginsky1999ACSAC 1999