The document discusses two novel techniques for efficiently authenticating short encrypted messages, aimed at improving the security and performance of mobile and pervasive computing applications. These methods leverage the existing encryption to enhance authentication processes and eliminate the complications associated with one-time key management. The proposed techniques offer greater efficiency compared to traditional methods while ensuring robust message security.