Mamidi, Upendarreddy
(2016-03-04)
Traditionally, authenticated encryption was achieved by using two seperate algorithms for encryption
and authentication. Recently, modes that combine encryption and authentication together
are being proposed. This feature ...