Chris J. Mitchell Cryptanalysis of an authenticated encryption technique.
This is a version This version's date is: This item is not peer reviewed
https://repository.royalholloway.ac.uk/items/21df06f7-b88b-16c1-c7c9-971eb089bbe9/2/
Deposited by Research Information System (atira) on 24-May-2012 in Royal Holloway Research Online.Last modified on 24-May-2012