Last updated 1 year ago
Encryption mixed with integrity control.
Error propagation.
Authentication tags.
Examples.
GCM (Galois/Counter Mode).
CCM (Counter with CBC-MAC).
CTR mode encryption.
Successive multiplications for integrity control.
Multiplications in GF(2n).
H = Ek(0)