Ilya Kizhvatov

According to our database1, Ilya Kizhvatov authored at least 15 papers between 2008 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage.
IACR Cryptol. ePrint Arch., 2018

2015
Fast and Memory-Efficient Key Recovery in Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015

2012
Beyond the Limits of DPA: Combined Side-Channel Collision Attacks.
IEEE Trans. Computers, 2012

2011
Physical Security of Cryptographic Algorithm Implementations.
PhD thesis, 2011

Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF.
IACR Cryptol. ePrint Arch., 2011

2010
Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations.
IACR Cryptol. ePrint Arch., 2010

Combined Implementation Attack Resistant Exponentiation.
Proceedings of the Progress in Cryptology, 2010

Analysis and Improvement of the Random Delay Countermeasure of CHES 2009.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2009
An Efficient Method for Random Delay Generation in Embedded Software.
IACR Cryptol. ePrint Arch., 2009

Fault Attacks on RSA Signatures with Partially Unknown Messages.
IACR Cryptol. ePrint Arch., 2009

Side channel analysis of AVR XMEGA crypto engine.
Proceedings of the 4th Workshop on Embedded Systems Security, 2009

Analysis of the split mask countermeasure for embedded systems.
Proceedings of the 4th Workshop on Embedded Systems Security, 2009

2008
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection.
Proceedings of the Progress in Cryptology, 2008


  Loading...