Elena Dubrova

About Elena Dubrova

Elena Dubrova, With an exceptional h-index of 29 and a recent h-index of 21 (since 2020), a distinguished researcher at Kungliga Tekniska högskolan, specializes in the field of Lightweight Cryptography, Hardware Security, Fault-Tolerant Design, Multiple-Valued Logic, Logic Synthesis and Verification.

His recent articles reflect a diverse array of research interests and contributions to the field:

A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation

A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm

A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber

A side-channel attack on a masked and shuffled software implementation of Saber

Methods of verifying that a first device and a second device are physically interconnected

Secret Key Recovery Attack on Masked

Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization

Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

Elena Dubrova Information

University

Position

(KTH) Stockholm Sweden

Citations(all)

4242

Citations(since 2020)

1964

Cited By

2945

hIndex(all)

29

hIndex(since 2020)

21

i10Index(all)

92

i10Index(since 2020)

46

Email

University Profile Page

Google Scholar

Elena Dubrova Skills & Research Interests

Lightweight Cryptography

Hardware Security

Fault-Tolerant Design

Multiple-Valued Logic

Logic Synthesis and Verification

Top articles of Elena Dubrova

A Side-Channel Attack on a Higher-Order Masked CRYSTALS-Kyber Implementation

2024/2/29

Elena Dubrova
Elena Dubrova

H-Index: 17

A Shared Key Recovery Attack on a Masked Implementation of CRYSTALS-Kyber’s Encapsulation Algorithm

2023/12/11

Elena Dubrova
Elena Dubrova

H-Index: 17

A Side-Channel Attack on a Masked Hardware Implementation of CRYSTALS-Kyber

2023/11/30

Elena Dubrova
Elena Dubrova

H-Index: 17

A side-channel attack on a masked and shuffled software implementation of Saber

Journal of Cryptographic Engineering

2023/11

Methods of verifying that a first device and a second device are physically interconnected

2023/10/17

Secret Key Recovery Attack on Masked

Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings

2023/10/3

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Securing CRYSTALS-Kyber in FPGA Using Duplication and Clock Randomization

IEEE Design & Test

2023/7/25

Michail Moraitis
Michail Moraitis

H-Index: 2

Elena Dubrova
Elena Dubrova

H-Index: 17

Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

2023/7/10

Elena Dubrova
Elena Dubrova

H-Index: 17

Kalle Ngo
Kalle Ngo

H-Index: 3

Secret key recovery attack on masked and shuffled implementations of crystals-kyber and saber

2023/6/19

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs

2023/5/22

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

A side-channel attack on a hardware implementation of CRYSTALS-Kyber

2023/5/22

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

A side-channel resistant implementation of AES combining clock randomization with duplication

2023/5/21

Michail Moraitis
Michail Moraitis

H-Index: 2

Elena Dubrova
Elena Dubrova

H-Index: 17

A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts

2023/5/19

Elena Dubrova
Elena Dubrova

H-Index: 17

Is Your FPGA Transmitting Secrets: Covert Antennas from Interconnect

2023/5/15

Elena Dubrova
Elena Dubrova

H-Index: 17

FPGA design deobfuscation by iterative LUT modification at bitstream level

Journal of Hardware and Systems Security

2023/3

Michail Moraitis
Michail Moraitis

H-Index: 2

Elena Dubrova
Elena Dubrova

H-Index: 17

Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?

Cryptology ePrint Archive

2023

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber

Cryptology ePrint Archive

2023

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

A side-channel attack on a bitsliced higher-order masked crystals-kyber implementation

Cryptology ePrint Archive

2023

Elena Dubrova
Elena Dubrova

H-Index: 17

A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude-modulated EM emanations

2022/11/30

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Towards Generic Power/EM Side-Channel Attacks: Memory Leakage on General-Purpose Computers

2022/10/3

Elena Dubrova
Elena Dubrova

H-Index: 17

See List of Professors in Elena Dubrova University(Kungliga Tekniska högskolan)