Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm
MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses...
Saved in:
| Published in: | 2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES) pp. 154 - 159 |
|---|---|
| Main Authors: | , , , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
Lodz University of Technology
29.06.2023
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!