Authenticated Encyption Schemes and Misuse-Resistance

Posted by