3.11
Preventing the SWEET32 Attack
See
Preventing the SWEET32 Attack
.