Back to Results
First PageMeta Content
Stream ciphers / Cryptographic hash functions / Advanced Encryption Standard / Hamming weight / Py / Lookup table / Cryptography / Keccak / NIST hash function competition


Side-Channel Analysis of MAC-Keccak Hardware Implementations Pei Luo1 , Yunsi Fei1 , Xin Fang1 , A. Adam Ding2 , David R. Kaeli1 , and Miriam Leeser1 1 Department of Electrical and Computer Engineering, Northeastern Uni
Add to Reading List

Document Date: 2015-04-30 21:07:24


Open Document

File Size: 480,90 KB

Share Result on Facebook

Company

AES / KG01 / KG02 / /

Currency

pence / /

/

Facility

Northeastern University / /

IndustryTerm

hardware systems / crypto systems / performance-sensitive crypto systems / cryptographic systems / software implementations / cryptographic algorithms / secure hardware / software systems / /

Organization

Department of Electrical and Computer Engineering / Northeastern University / Boston / Department of Mathematics / /

/

Position

CPA / CPA for analysis / /

Product

R1 / Hamming / /

ProvinceOrState

Reg / Massachusetts / /

Technology

FPGA / Microblaze processor / secret key / VHDL / /

SocialTag