From 4dc806ffbb273a5db8efbcf13e86c4d1d1799d86 Mon Sep 17 00:00:00 2001 From: Srini Date: Sat, 19 Oct 2024 23:45:20 -0400 Subject: [PATCH] lec09 fixes --- lectures/lec09.tex | 7 +++++-- 1 file changed, 5 insertions(+), 2 deletions(-) diff --git a/lectures/lec09.tex b/lectures/lec09.tex index f1d4891..e82b91d 100644 --- a/lectures/lec09.tex +++ b/lectures/lec09.tex @@ -169,8 +169,11 @@ \subsection{Encrypt then MAC} \section{AES-GCM (Galois Counter Mode)}\label{sec:enc:gcm} One of the most widely used authenticated-encryption constructions is AES-GCM. It follows the encrypt-then-MAC paradigm. -It uses AES as a pseudorandom function for counter-mode encryption (\cref{sec:enc:ctr}). -It uses a Carter-Wegman-style MAC (\cref{sec:mac:cw}) as the MAC scheme. +It uses AES as a pseudorandom function for counter-mode encryption from the previous +lecture. %(\cref{sec:enc:ctr}). +It uses a Carter-Wegman-style MAC -- see previous lecture -- +%(\cref{sec:mac:cw}) +as the MAC scheme. There are a few optimizations that AES-GCM uses beyond what we have described: \begin{itemize}