Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation

Charanjit S. Jutla. Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation. IACR Cryptology ePrint Archive, 2018:128, 2018. [doi]

@article{Jutla18,
  title = {Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation},
  author = {Charanjit S. Jutla},
  year = {2018},
  url = {http://eprint.iacr.org/2018/128},
  researchr = {https://researchr.org/publication/Jutla18},
  cites = {0},
  citedby = {0},
  journal = {IACR Cryptology ePrint Archive},
  volume = {2018},
  pages = {128},
}