Kalle Ngo

Orcid: 0000-0002-9842-2038

According to our database1, Kalle Ngo authored at least 25 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium.
IACR Commun. Cryptol., 2024

Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

2023
A side-channel attack on a masked and shuffled software implementation of Saber.
J. Cryptogr. Eng., November, 2023

Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
IACR Cryptol. ePrint Arch., 2023

A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2023

Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs.
Proceedings of the 53rd IEEE International Symposium on Multiple-Valued Logic, 2023

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023

Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022

Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022

Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2022

A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2022

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste.
IACR Cryptol. ePrint Arch., 2022

Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.
IACR Cryptol. ePrint Arch., 2022

A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Side-Channel Analysis of the Random Number Generator in STM32 MCUs.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

2021
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis.
IACR Cryptol. ePrint Arch., 2021

A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM.
IACR Cryptol. ePrint Arch., 2021

2020
Bitstream Modification of Trivium.
IACR Cryptol. ePrint Arch., 2020

Breaking ACORN at Bitstream Level.
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020

Attacking Trivium at the Bitstream Level.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

2017
Towards a single event upset detector based on COTS FPGA.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2017

Mitigating single-event upsets in COTS SDRAM using an EDAC SDRAM controller.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2017

Implementation of a fault-tolerant, globally-asynchronous-locally-synchronous, inter-chip NoC communication bridge on FPGAs.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2017


  Loading...