{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T08:58:14Z","timestamp":1753520294548},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,29]],"date-time":"2023-06-29T00:00:00Z","timestamp":1687996800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,29]]},"DOI":"10.23919\/mixdes58562.2023.10203249","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T17:23:39Z","timestamp":1691601819000},"page":"154-159","source":"Crossref","is-referenced-by-count":1,"title":["Power Analysis Attacks on the Customizable MK-3 Authenticated Encryption Algorithm"],"prefix":"10.23919","author":[{"given":"Peter","family":"Fabinski","sequence":"first","affiliation":[{"name":"Rochester Institute of Technology,Department of Computer Engineering"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Steve","family":"Farris","sequence":"additional","affiliation":[{"name":"L3Harris Technologies"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michael","family":"Kurdziel","sequence":"additional","affiliation":[{"name":"L3Harris Technologies"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcin","family":"Lukowiak","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Department of Computer Engineering"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stanislaw","family":"Radziszowski","sequence":"additional","affiliation":[{"name":"Rochester Institute of Technology,Department of Computer Engineering"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795498"},{"journal-title":"Large substitution boxes with efficient combinational implementations","year":"2013","author":"wood","key":"ref12"},{"key":"ref15","article-title":"Correlation power analysis of MK-3 and countermea-sures","author":"stafford","year":"2017","journal-title":"Project report Rochester Institute of Technology"},{"journal-title":"Evaluating performance and efficiency of a 16-bit substitution box on an FPGA","year":"2021","author":"stafford","key":"ref14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10175-0_17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13389-011-0006-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2015.7357416"},{"key":"ref1","article-title":"Design and cryptanalysis of a customizable authenticated en-cryption algorithm","author":"kelly","year":"2014","journal-title":"Master's Thesis Rochester Institute of Technology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8080-9"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28632-5_2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_25"},{"journal-title":"Cryptographic Sponge Functions","year":"2011","author":"bertoni","key":"ref4"},{"key":"ref3","first-page":"1","article-title":"Customization modes for the Harris MK-3 authenticated en-cryption algorithm","author":"bajorski","year":"0","journal-title":"MILCOM 2018 &#x2013; 2018 IEEE Military Commu-nications Conference (MIL COM)"},{"journal-title":"Side-channel attacks and countermeasures for the MK-3 authenticated encryption scheme","year":"2022","author":"fabinski","key":"ref6"},{"journal-title":"The Keccak SHA-3 Submission Version 3","year":"2011","author":"bertoni","key":"ref5"}],"event":{"name":"2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES)","start":{"date-parts":[[2023,6,29]]},"location":"Krak\u00f3w, Poland","end":{"date-parts":[[2023,6,30]]}},"container-title":["2023 30th International Conference on Mixed Design of Integrated Circuits and System (MIXDES)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10203036\/10203110\/10203249.pdf?arnumber=10203249","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,10]],"date-time":"2023-08-10T17:25:36Z","timestamp":1691688336000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10203249\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,29]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/mixdes58562.2023.10203249","relation":{},"subject":[],"published":{"date-parts":[[2023,6,29]]}}}