Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm.
Peter FabinskiSteven FarrisMichael T. KurdzielMarcin LukowiakStanislaw P. RadziszowskiPublished in: MIXDES (2023)
Keyphrases
- encryption algorithm
- power analysis
- differential power analysis
- s box
- smart card
- security analysis
- countermeasures
- authentication scheme
- block cipher
- encryption algorithms
- secret key
- pseudorandom
- data encryption
- key distribution
- information security
- authentication protocol
- security requirements
- user authentication
- initial conditions
- encryption scheme
- elliptic curve
- advanced encryption standard
- image encryption
- security mechanisms