Login / Signup
Implementing authenticated encryption algorithm MK-3 on FPGA.
Gordon Werner
Steven Farris
Alan Kaminsky
Michael T. Kurdziel
Marcin Lukowiak
Stanislaw P. Radziszowski
Published in:
MILCOM (2016)
Keyphrases
</>
encryption algorithm
encryption algorithms
security analysis
data encryption
pseudorandom
digital content
chaotic maps
authentication scheme
signal processing
efficient implementation
s box
low cost
encryption scheme