Return to Article Details Efficient Technique for Providing Authentication of Short Encrypted Messages Download Download PDF