The classical approach to achieve multiple security properties such as authentication, integrity and confidentiality is to combine dedicated building blocks separately achieving each property. This apparently obvious process proves in fact to be very difficult, as testified by numerous attacks exploiting weaknesses in the “mortar” connecting the blocks, even in widely used, and presumably well-known, products such as OpenSSL. A promising approach to solve this issue is the use of combined primitives. This is for example the case for authenticated encryption, a fundamental cryptographic primitive that ensures at the same time confidentiality, integrity and authentication. Many new authenticated encryption schemes were recently proposed in the framework of the CAESAR competition.