“…However, as demonstrated in [21,36,38], these kinds of attacks can be mounted in some of the current real-world applications such as the IBM 4758 cryptoprocessor, PGV-type hash functions, message authentication codes, recent authenticated encryption modes, cases of key-exchange protocols that do not guarantee key integrity, and key-update protocols that updates session keys using a known function, for example, K, K + 1, K + 2, etc., where K is a session key.…”