Kalle Ngo

Orcid: 0000-0002-9842-2038

According to our database1, Kalle Ngo authored at least 25 papers between 2017 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unpacking Needs Protection: A Single-Trace Secret Key Recovery Attack on Dilithium.
IACR Commun. Cryptol., 2024

Breaking SCA-Protected CRYSTALS-Kyber with a Single Trace.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

2023
A side-channel attack on a masked and shuffled software implementation of Saber.
J. Cryptogr. Eng., November, 2023

Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
IACR Cryptol. ePrint Arch., 2023

A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2023

Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs.
Proceedings of the 53rd IEEE International Symposium on Multiple-Valued Logic, 2023

A Side-Channel Attack on a Hardware Implementation of CRYSTALS-Kyber.
Proceedings of the IEEE European Test Symposium, 2023

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023

Secret Key Recovery Attack on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Making Biased DL Models Work: Message and Key Recovery Attacks on Saber Using Amplitude-Modulated EM Emanations.
IACR Cryptol. ePrint Arch., 2022

Side-Channel Attacks on Lattice-Based KEMs Are Not Prevented by Higher-Order Masking.
IACR Cryptol. ePrint Arch., 2022

Breaking a Fifth-Order Masked Implementation of CRYSTALS-Kyber by Copy-Paste.
IACR Cryptol. ePrint Arch., 2022

Secret Key Recovery Attacks on Masked and Shuffled Implementations of CRYSTALS-Kyber and Saber.
IACR Cryptol. ePrint Arch., 2022

A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Side-Channel Analysis of the Random Number Generator in STM32 MCUs.
Proceedings of the GLSVLSI '22: Great Lakes Symposium on VLSI 2022, Irvine CA USA, June 6, 2022

Side-Channel Analysis of Saber KEM Using Amplitude-Modulated EM Emanations.
Proceedings of the 25th Euromicro Conference on Digital System Design, 2022

2021
A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM Implementation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM.
IACR Cryptol. ePrint Arch., 2021

Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021

2020
Bitstream Modification of Trivium.
IACR Cryptol. ePrint Arch., 2020

Breaking ACORN at Bitstream Level.
Proceedings of the 28th IFIP/IEEE International Conference on Very Large Scale Integration, 2020

Attacking Trivium at the Bitstream Level.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

2017
Towards a single event upset detector based on COTS FPGA.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2017

Mitigating single-event upsets in COTS SDRAM using an EDAC SDRAM controller.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2017

Implementation of a fault-tolerant, globally-asynchronous-locally-synchronous, inter-chip NoC communication bridge on FPGAs.
Proceedings of the IEEE Nordic Circuits and Systems Conference, 2017


  Loading...