##article.return## Security Analysis of Candidates for Authenticated Encryption and Cryptanalytic Attacks to Check Robustness Download Download PDF