The power of verification queries in message authenticationand authenticated encryption. Cryptology ePrint Archive: Report 2004/309, 2004.[10] M. Bellare and P. Rogaway. The game-playing technique and its application to triple encryption. Cryptology ePrin (1999)

by M Bellare, O Goldreich, A Mityagin
Venue:Krovetz and P. Rogaway. UMAC: Fast and SecureMessage Authentication. Advances in Cryptology - CRYPTO '99, Lecture Notes in Computer ScienceVol