IT Security techniques — Entity authentication —Part 2: Mechanisms using authenticated encryptionTechniques de séc...