Another Look at Security Theorems for 1-Key Nested MACs
2014 ◽
pp. 69-89
◽