Kalle Ngo

About Kalle Ngo

Kalle Ngo, With an exceptional h-index of 8 and a recent h-index of 8 (since 2020), a distinguished researcher at Kungliga Tekniska högskolan, specializes in the field of Hardware Security, Side-Channel Analysis, Post-Quantum Cryptography, FPGA, Computer Architecture.

His recent articles reflect a diverse array of research interests and contributions to the field:

A side-channel attack on a masked and shuffled software implementation of Saber

Secret Key Recovery Attack on Masked

Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

Secret key recovery attack on masked and shuffled implementations of crystals-kyber and saber

Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs

A side-channel attack on a hardware implementation of CRYSTALS-Kyber

Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?

A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber

Kalle Ngo Information

University

Position

PhD Student

Citations(all)

256

Citations(since 2020)

255

Cited By

14

hIndex(all)

8

hIndex(since 2020)

8

i10Index(all)

7

i10Index(since 2020)

7

Email

University Profile Page

Google Scholar

Kalle Ngo Skills & Research Interests

Hardware Security

Side-Channel Analysis

Post-Quantum Cryptography

FPGA

Computer Architecture

Top articles of Kalle Ngo

A side-channel attack on a masked and shuffled software implementation of Saber

Journal of Cryptographic Engineering

2023/11

Secret Key Recovery Attack on Masked

Applied Cryptography and Network Security Workshops: ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19–22, 2023, Proceedings

2023/10/3

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Breaking a fifth-order masked implementation of crystals-kyber by copy-paste

2023/7/10

Elena Dubrova
Elena Dubrova

H-Index: 17

Kalle Ngo
Kalle Ngo

H-Index: 3

Secret key recovery attack on masked and shuffled implementations of crystals-kyber and saber

2023/6/19

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Higher-Order Boolean Masking Does Not Prevent Side-Channel Attacks on LWE/LWR-based PKE/KEMs

2023/5/22

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

A side-channel attack on a hardware implementation of CRYSTALS-Kyber

2023/5/22

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Single-Trace Side-Channel Attacks on CRYSTALS-Dilithium: Myth or Reality?

Cryptology ePrint Archive

2023

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

A Single-Trace Message Recovery Attack on a Masked and Shuffled Implementation of CRYSTALS-Kyber

Cryptology ePrint Archive

2023

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Side-Channel Analysis of Post-Quantum Cryptographic Algorithms

2023

Kalle Ngo
Kalle Ngo

H-Index: 3

A message recovery attack on LWE/LWR-based PKE/KEMs using amplitude-modulated EM emanations

2022/11/30

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Side-channel analysis of Saber KEM using amplitude-modulated EM emanations

2022/8/31

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Side-channel analysis of the random number generator in STM32 MCUs

2022/6/6

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Side-channel attacks on lattice-based KEMs are not prevented by higher-order masking

Cryptology ePrint Archive

2022

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Making biased DL models work: Message and key recovery attacks on Saber using amplitude-modulated EM emanations

Cryptology ePrint Archive

2022

Kalle Ngo
Kalle Ngo

H-Index: 3

Elena Dubrova
Elena Dubrova

H-Index: 17

Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis

2021/11/19

A side-channel attack on a masked IND-CCA secure saber KEM implementation

IACR Transactions on Cryptographic Hardware and Embedded Systems

2021/8/11

Attacking Trivium at the Bitstream Level

2020/10/18

Breaking ACORN at bitstream level

2020/10/5

See List of Professors in Kalle Ngo University(Kungliga Tekniska högskolan)

Co-Authors

academic-engine