Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions

Next slide Back to first slide View graphic version