H Shin-Jia, C Chin-Chen, Y Wei-Pang - Information Processing Letters, 1996 - elibrary.ru
Authenticated encryption schemes need redundancy schemes to link up the message
blocks; however, these redundancies increase communication costs. To construct links …