Return to Article Details Substitution Attacks against Message Authentication Download Download PDF