An effective defense against first party attacks in public-key algorithms | IEEE Conference Publication | IEEE Xplore