Second preimage attack method on various MAC constructions and its application with AES-128 | IEEE Conference Publication | IEEE Xplore