MILCOM 2016 - 2016 IEEE Military Communications Conference 2016
DOI: 10.1109/milcom.2016.7795498
|View full text |Cite
|
Sign up to set email alerts
|

Implementing authenticated encryption algorithm MK-3 on FPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…The MK-3 algorithm is a single pass authenticated encryption algorithm designed with hardware implementation in mind [1], [2], [3], [4], [5]. The core of MK-3 is a permutation function f comprised of 4 transformations, which are computed on a 512-bit state split into 16-bit words.…”
Section: A Mk-3 Authenticated Encryption Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The MK-3 algorithm is a single pass authenticated encryption algorithm designed with hardware implementation in mind [1], [2], [3], [4], [5]. The core of MK-3 is a permutation function f comprised of 4 transformations, which are computed on a 512-bit state split into 16-bit words.…”
Section: A Mk-3 Authenticated Encryption Algorithmmentioning
confidence: 99%
“…The MK-3 is an authenticated symmetric-key encryption algorithm based on the duplex sponge construction, suitable for both hardware and software, but whose design features are targeted specially for hardware implementations [1], [2], [3], [4], [5]. The MK-3 cypher is a proprietary algorithm of L3Harris Technologies.…”
Section: Introductionmentioning
confidence: 99%
“…It can be configured or reprogrammed by customers or designer engineers after manufacturing [10]. FPGA hardware design is increasingly popular in applications like graphic processing [11], digital signal filtering [12], cryptography [13], and also the electric motor drives [8], [9]. This is owing to its flexibility, very fast computation time with low latency, low power consumption and its continual improvement of the technology, which make it even better in the future.…”
Section: Introductionmentioning
confidence: 99%