<p>This paper is accepted for publication in vol. 30 of Information&Security and will be available before the end of December 2013.</p>