[1]
A. Dutta, A. Jha, and M. Nandi, “Tight Security Analysis of EHtM MAC”, ToSC, vol. 2017, no. 3, pp. 130–150, Sep. 2017.