Authenticated Encryption Prev: Keyed Hashing Next: Hard Problems Prev: Keyed Hashing Next: Hard Problems