MAC Constructions: Security Bounds and Distinguishing Attacks