Authentication

Analysis of existing Beyond Birthday Bound MAC schemes

Theoretically and practically analyzed the Encrypted Wegmen-Carter MAC scheme and H-coefficients technique