Homework 3:

Exercises 4.3,4.4,4.7 [instead of a full proof just explain how the proof of the original construction has to be modified to argue this one], 4.8, 4.15, 4.17, 4.19 [recall that unique tags in a mac is a good thing for encrypt-then-authenticate!]