Research Article

Close to Optimally Secure Variants of GCM

Algorithm 3

The hash algorithm .
Input: a hash key , an associated data , and a ciphertext
Output: a hash value
Partition into , for
for to
return