Return to Article Details Tight Security Analysis of EHtM MAC Download Download PDF