Keyed Hashing Prev: Hash Functions Next: Authenticated Encryption Prev: Hash Functions Next: Authenticated Encryption