Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation

Charanjit S. Jutla. Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation. IACR Cryptology ePrint Archive, 2018:128, 2018. [doi]

Abstract

Abstract is missing.