Kleptographic Weaknesses in Benaloh-Tuinstra Protocol | IEEE Conference Publication | IEEE Xplore