Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm

MK-3 is an authenticated encryption scheme based on the duplex sponge construction, suitable for both hardware and software. It provides broad factory and field customization features. The same security claims are valid for the original and all recommended customizations. Extensive security analyses...

Full description

Saved in:
Bibliographic Details
Published in:2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES) pp. 154 - 159
Main Authors: Fabinski, Peter, Farris, Steve, Kurdziel, Michael, Lukowiak, Marcin, Radziszowski, Stanislaw
Format: Conference Proceeding
Language:English
Published: Lodz University of Technology 29.06.2023
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first