A new authenticated encryption schemes without using Hash and Redundancy functions | IEEE Conference Publication | IEEE Xplore