Analysis of existing Beyond Birthday Bound MAC schemes
• Cryptanalysis techniques on Beyond Birthday-Bound Secure claimed MAC schemes such as EWCDM, etc..
• Theoretically and practically analyzed the Encrypted Wegmen-Carter MAC scheme and H-coefficients technique.