![]() ![]() ![]() Several recent proposals can be considered as instances of this general model, as they all perform message accumulation in this way. The input message is used indirectly to control segments of the keystream that form the MAC tag. This paper presents a model for the generation of a MAC tag using a stream cipher. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |