30 likes | 120 Vues
Explore cutting-edge encryption modes like HCTR and AES-CTR for robust data security. Learn about novel polynomial evaluation techniques and AES integration for heightened protection.
E N D
HCTR (Wang, Feng, Wu‘05) 128-bits the rest P1 P2 T Polynomial-evaluation Similar to GHASH AES-CTR AES IV Polynomial-evaluation Similar to GHASH C1 C2 ~4m GF multiplications, ~m AES
PEP (Chakraborty, Sarkar) T P AES Invertible polynomial evaluation key AES-ECB Invertible polynomial evaluation C ~4m GF multiplications, ~m AES