Kalle Ngo
Kungliga Tekniska högskolan
H-index: 8
Europe-Sweden
Top articles of Kalle Ngo
A side-channel attack on a masked and shuffled software implementation of Saber
Journal of Cryptographic Engineering
2023/11
Secret Key Recovery Attack on Masked
Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings
2023/10/3
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Breaking a fifth-order masked implementation of crystals-kyber by copy-paste
2023/7/10
Elena Dubrova
H-Index: 17
Kalle Ngo
H-Index: 3
Secret key recovery attack on masked and shuffled implementations of crystals-kyber and saber
2023/6/19
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs
2023/5/22
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
A side-channel attack on a hardware implementation of CRYSTALS-Kyber
2023/5/22
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?
Cryptology ePrint Archive
2023
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber
Cryptology ePrint Archive
2023
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Side-Channel Analysis of Post-Quantum Cryptographic Algorithms
2023
Kalle Ngo
H-Index: 3
A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude-modulated EM emanations
2022/11/30
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Side-channel analysis of Saber KEM using amplitude-modulated EM emanations
2022/8/31
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Side-channel analysis of the random number generator in STM32 MCUs
2022/6/6
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Side-channel attacks on lattice-based KEMs are not prevented by higher-order masking
Cryptology ePrint Archive
2022
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Making biased DL models work: Message and key recovery attacks on Saber using amplitude-modulated EM emanations
Cryptology ePrint Archive
2022
Kalle Ngo
H-Index: 3
Elena Dubrova
H-Index: 17
Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis
2021/11/19
A side-channel attack on a masked IND-CCA secure saber KEM implementation
IACR Transactions on Cryptographic Hardware and Embedded Systems
2021/8/11
Attacking Trivium at the Bitstream Level
2020/10/18
Breaking ACORN at bitstream level
2020/10/5