Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2018
/
Article
/
Alg 3
/
Research Article
Close to Optimally Secure Variants of GCM
Algorithm 3
The hash algorithm
.
Input
: a hash key
,
an associated data
,
and a ciphertext
Output
: a hash value
Partition
into
,
for
for
to
return