Dan Klann

According to our database1, Dan Klann authored at least 29 papers between 2018 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On the Complexity of Attacking Elliptic Curve Based Authentication Chips.
CoRR, 2022

2021
On the Complexity of Attacking Commercial Authentication Products.
Microprocess. Microsystems, 2021

Resilience in the Cyberworld: Definitions, Features and Models.
Future Internet, 2021

Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice.
J. Electron. Test., 2021

Resilience in the Cyber World: Definitions, Features and Models.
CoRR, 2021

FFT based Horizontal SCA Attack against ECC.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks.
Proceedings of the 10th Mediterranean Conference on Embedded Computing, 2021

EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns.
Proceedings of the 22nd IEEE Latin American Test Symposium, 2021

Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
Methods increasing inherent resistance of ECC designs against horizontal attacks.
Integr., 2020

No Resilience without Security.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Horizontal SCA Attacks against $kP$ Algorithm Using K-Means and PCA.
Proceedings of the 9th Mediterranean Conference on Embedded Computing, 2020

Resistance of the Montgomery kP Algorithm against Simple SCA: Theory and Practice.
Proceedings of the IEEE Latin-American Test Symposium, 2020

Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA.
Proceedings of the 15th Design & Technology of Integrated Systems in Nanoscale Era, 2020

Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves.
Proceedings of the 23rd Euromicro Conference on Digital System Design, 2020

2019
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack.
Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs, 2019

On the Complexity of Attacking Commercial Authentication Products.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference.
Proceedings of the 8th Mediterranean Conference on Embedded Computing, 2019

Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

ECC Based Secure Authentication Solutions.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Horizontal SCA Attack using Machine Learning Algorithms.
Proceedings of the 30. Krypto-Tag, Berlin, Germany, March 28-29, 2019, 2019

Evaluation of the ECDSA IHP Hardware Accelerator.
Proceedings of the 31. Krypto-Tag, Berlin, Germany, October 17-18, 2019, 2019

Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication.
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019

Caution: GALS-ification as a Means against SCA Attacks.
Proceedings of the 2019 IEEE East-West Design & Test Symposium, 2019

Horizontal Attacks Against ECC: From Simulations to ASIC.
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019

Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula.
Proceedings of the 14th International Conference on Design & Technology of Integrated Systems In Nanoscale Era, 2019

2018
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe.
IACR Cryptol. ePrint Arch., 2018


  Loading...