p.1 / Index Terms / replay attacks, [...], run identifiers, component numbers. / I. INTRODUCTION / p.3 / In the same spirit, we prove that all replay attacks can be pre- vented by tagging each encrypted component with a session- id (another name for Carlsen’s protocol run identifier) and a component number (renaming Carlsen’s message subcompo- nent identifier).(English)