MAC and Key Derivation - Practical Cryptography for Developers
Social pulse
Authenticated encryption - Wikipedia
Authenticated Encryption for Network Security - YouTube
Cryptography with Python 33: Implementing Encrypt-then-MAC in Python - YouTube
Magnus K Karlsson: Symmetric Authenticated Encryption (AE) or Authenticated Encryption with Associated Data (AEAD)
GitHub - lpoulain/break_MAC-then-encrypt: Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme
GitHub - SoursosK/Encrypt-then-MAC: A demo app applying the Encrypt-then-MAC scheme to a phrase, using AES-CBC 256 and HmacSHA256.
GK Palem on Twitter: "Among the three methods for #Blockchain #Ciphers the Encrypt-Then-MAC has been regarded as the highest definition of security with "strongly unforgeable" MAC, compared with MAC-then-encrypt or Encrypt -and-MAC. Authenticated
TLS Essentials 6: Authenticity with MACs, Encrypt-then-MAC and GCM - YouTube