Part II: <a href="https://neilmadden.blog/2018/11/26/public-key-authenticated-encryption-and-why-you-want-it-part-ii/" rel="nofollow">https://neilmadden.blog/2018/11/26/public-key-authenticated-...</a><p>Part III: <a href="https://neilmadden.blog/2018/12/14/public-key-authenticated-encryption-and-why-you-want-it-part-iii/" rel="nofollow">https://neilmadden.blog/2018/12/14/public-key-authenticated-...</a>