default search action
Zoya Dyka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning. Future Internet 16(2): 45 (2024) - [j11]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Advantages of unsupervised learning analysis methods in single-trace SCA attacks. Microprocess. Microsystems 105: 104994 (2024) - [c77]Ievgen Kabin, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer:
Static Power Consumption as a New Side-Channel Analysis Threat to Elliptic Curve Cryptography Implementations. CSR 2024: 884-889 - [c76]Ievgen Kabin, Jan Schäffner, Alkistis Aikaterini Sigourou, Dmytro Petryk, Zoya Dyka, Dominik Klein, Sven Freud, Peter Langendoerfer:
Stealth Attacks on PCBs: An Experimental Plausibility Analysis. CSR 2024: 905-912 - [c75]Ievgen Kabin, Peter Langendoerfer, Zoya Dyka:
Exploiting Static Power Consumption in Side-Channel Analysis. LATS 2024: 1-4 - [c74]Zoya Dyka, Ievgen Kabin, Marcin Brzozowski, Goran Panic, Cristiano Calligaro, Milos Krstic, Peter Langendoerfer:
On the Influence of Cell Libraries and Other Parameters to SCA Resistance of Crypto IP Cores. MECO 2024: 1-5 - [c73]Dmytro Petryk, Ievgen Kabin, Peter Langendörfer, Zoya Dyka:
On the Importance of Reproducibility of Experimental Results Especially in the Domain of Security. MECO 2024: 1-5 - [i37]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps. CoRR abs/2404.06159 (2024) - [i36]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Oleksandr O. Sudakov, Andrii Cherninskyi, Marcin Brzozowski, Peter Langendoerfer:
Intelligence and Motion Models of Continuum Robots: an Overview. CoRR abs/2404.06171 (2024) - [i35]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Resilient Movement Planning for Continuum Robots. CoRR abs/2404.06178 (2024) - [i34]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendörfer:
Towards Secure and Reliable Heterogeneous Real-time Telemetry Communication in Autonomous UAV Swarms. CoRR abs/2404.07557 (2024) - [i33]Dmytro Petryk, Zoya Dyka, Ievgen Kabin, Anselm Breitenreiter, Jan Schäffner, Milos Krstic:
Laser Fault Injection Attacks against Radiation Tolerant TMR Registers. CoRR abs/2407.06751 (2024) - [i32]Dmytro Petryk, Zoya Dyka, Milos Krstic, Jan Belohoubek, Petr Fiser, Frantisek Steiner, Tomás Blecha, Peter Langendörfer, Ievgen Kabin:
On the Influence of the Laser Illumination on the Logic Cells Current Consumption. CoRR abs/2407.06758 (2024) - [i31]Dmytro Petryk, Ievgen Kabin, Peter Langendörfer, Zoya Dyka:
On the Importance of Reproducibility of Experimental Results Especially in the Domain of Security. CoRR abs/2407.06760 (2024) - [i30]Sze Hei Li, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer, Ievgen Kabin:
Practical Investigation on the Distinguishability of Longa's Atomic Patterns. CoRR abs/2409.11868 (2024) - 2023
- [j10]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Oleksandr O. Sudakov, Andrii Cherninskyi, Marcin Brzozowski, Peter Langendoerfer:
Intelligence and Motion Models of Continuum Robots: An Overview. IEEE Access 11: 60988-61003 (2023) - [c72]Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA. CSR 2023: 580-585 - [c71]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Semi-Supervised Horizontal Attack Against Elliptic Curve Scalar Multiplication Using Support Vector Machines. DSD 2023: 708-713 - [c70]Ievgen Kabin, Peter Langendoerfer, Zoya Dyka:
Vulnerability of Atomic Patterns to Simple SCA. EWDTS 2023: 1-4 - [c69]Dmytro Petryk, Zoya Dyka, Milos Krstic, Jan Belohoubek, Petr Fiser, Frantisek Steiner, Tomás Blecha, Peter Langendörfer, Ievgen Kabin:
On the Influence of the Laser Illumination on the Logic Cells Current Consumption : First measurement results. ICECS 2023: 1-6 - [c68]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendoerfer:
GPS-Spoofing Attack Detection Mechanism for UAV Swarms. MECO 2023: 1-8 - [c67]Alkistis Aikaterini Sigourou, Ievgen Kabin, Peter Langendörfer, Nicolas Sklavos, Zoya Dyka:
Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks. MECO 2023: 1-6 - [i29]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendoerfer:
GPS-Spoofing Attack Detection Mechanism for UAV Swarms. CoRR abs/2301.12766 (2023) - 2022
- [j9]Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks. Sensors 22(8): 3083 (2022) - [c66]Zoya Dyka, Ievgen Kabin, Marcin Brzozowski, Goran Panic, Cristiano Calligaro, Milos Krstic, Peter Langendoerfer:
On the SCA Resistance of Crypto IP Cores. LATS 2022: 1-2 - [c65]Dmytro Petryk, Zoya Dyka, Ievgen Kabin, Anselm Breitenreiter, Jan Schäffner, Milos Krstic:
Laser Fault Injection Attacks against Radiation Tolerant TMR Registers. LATS 2022: 1-2 - [c64]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps. MECO 2022: 1-6 - [i28]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer:
Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA Attacks. CoRR abs/2201.01147 (2022) - [i27]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendoerfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. CoRR abs/2201.01153 (2022) - [i26]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendoerfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. CoRR abs/2201.01158 (2022) - [i25]R. Kovtun, Sergiy Radchenko, Andrii Netreba, Oleksandr O. Sudakov, Roman Natarov, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Exploiting EEG Signals for Eye Motion Tracking. CoRR abs/2201.01181 (2022) - [i24]Roman Natarov, Oleksandr O. Sudakov, Zoya Dyka, Ievgen Kabin, Oleksandr Maksymyuk, Olena Iegorova, Oleg Krishtal, Peter Langendörfer:
Resilience Aspects in Distributed Wireless Electroencephalographic Sampling. CoRR abs/2201.01272 (2022) - [i23]Marcin Aftowicz, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendoerfer:
Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA. CoRR abs/2201.01711 (2022) - [i22]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Clustering versus Statistical Analysis for SCA: when Machine Learning is Better. CoRR abs/2201.01717 (2022) - [i21]Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendoerfer:
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. CoRR abs/2201.02007 (2022) - [i20]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer:
Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks. CoRR abs/2201.02391 (2022) - [i19]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. CoRR abs/2201.02866 (2022) - [i18]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal Attacks against ECC: from Simulations to ASIC. CoRR abs/2201.02868 (2022) - [i17]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendoerfer:
Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms. CoRR abs/2201.04425 (2022) - [i16]Kai Lehniger, Marcin J. Aftowicz, Peter Langendörfer, Zoya Dyka:
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture. CoRR abs/2201.06785 (2022) - [i15]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Michael Kuba, Peter Langendoerfer:
Octopuses: biological facts and technical solutions. CoRR abs/2201.07885 (2022) - [i14]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendoerfer:
On the Complexity of Attacking Elliptic Curve Based Authentication Chips. CoRR abs/2201.09631 (2022) - 2021
- [j8]Ali Haddadi Esfahani, Zoya Dyka, Steffen Ortmann, Peter Langendörfer:
Impact of Data Preparation in Freezing of Gait Detection Using Feature-Less Recurrent Neural Network. IEEE Access 9: 138120-138131 (2021) - [j7]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendoerfer:
Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice. J. Electron. Test. 37(3): 289-303 (2021) - [j6]Elisabeth Vogel, Zoya Dyka, Dan Klann, Peter Langendörfer:
Resilience in the Cyberworld: Definitions, Features and Models. Future Internet 13(11): 293 (2021) - [j5]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. Microprocess. Microsystems 80: 103480 (2021) - [j4]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Ievgen Kabin, Jens Katzer, Jan Schäffner, Peter Langendörfer:
Sensitivity of HfO2-based RRAM Cells to Laser Irradiation. Microprocess. Microsystems 87: 104376 (2021) - [c63]Patrick Langer, Ali Haddadi Esfahani, Zoya Dyka, Peter Langendörfer:
FPGA-Based Realtime Detection of Freezing of Gait of Parkinson Patients. BODYNETS 2021: 101-111 - [c62]Ievgen Kabin, Dan Klann, Zoya Dyka, Peter Langendoerfer:
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. CSR 2021: 273-280 - [c61]Dmytro Petryk, Zoya Dyka, Roland Sorge, Jan Schäffner, Peter Langendörfer:
Optical Fault Injection Attacks against Radiation-Hard Shift Registers. DSD 2021: 371-375 - [c60]Alejandro Sosa, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Simulation of Electromagnetic Emanation of Cryptographic ICs: Tools, Methods, Problems. EWDTS 2021: 1-5 - [c59]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns. LATS 2021: 1-2 - [c58]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Clustering versus Statistical Analysis for SCA: when Machine Learning is Better. MECO 2021: 1-5 - [c57]Zoya Dyka, Ievgen Kabin, Dan Klann, Peter Langendörfer:
Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks. MECO 2021: 1-6 - [c56]Pavlo Mykytyn, Marcin Brzozowski, Zoya Dyka, Peter Langendörfer:
Jamming Detection for IR-UWB Ranging Technology in Autonomous UAV Swarms. MECO 2021: 1-6 - [c55]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Michael Kuba, Peter Langendörfer:
Octopuses: biological facts and technical solutions. MECO 2021: 1-7 - [c54]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendörfer:
FFT based Horizontal SCA Attack against ECC. NTMS 2021: 1-5 - [i13]Dmytro Petryk, Zoya Dyka, Peter Langendörfer:
Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology. CoRR abs/2103.12433 (2021) - [i12]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Mamathamba Kalishettyhalli Mahadevaiaha, Ievgen Kabin, Christian Wenger, Peter Langendörfer:
Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks. CoRR abs/2103.12435 (2021) - [i11]Dmytro Petryk, Zoya Dyka, Jens Katzer, Peter Langendörfer:
Metal Fillers as Potential Low Cost Countermeasure against Optical Fault Injection Attacks. CoRR abs/2103.12436 (2021) - [i10]Elisabeth Vogel, Zoya Dyka, Dan Klann, Peter Langendörfer:
Resilience in the Cyber World: Definitions, Features and Models. CoRR abs/2105.10235 (2021) - [i9]Dmytro Petryk, Zoya Dyka, Roland Sorge, Jan Schäffner, Peter Langendörfer:
Optical Fault Injection Attacks against Radiation-Hard Registers. CoRR abs/2106.07271 (2021) - [i8]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns. CoRR abs/2106.12321 (2021) - 2020
- [j3]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Methods increasing inherent resistance of ECC designs against horizontal attacks. Integr. 73: 50-67 (2020) - [c53]Maksim Jenihhin, Said Hamdioui, Matteo Sonza Reorda, Milos Krstic, Peter Langendörfer, Christian Sauer, Anton Klotz, Michael Hübner, Jörg Nolte, Heinrich Theodor Vierhaus, Georgios N. Selimis, Dan Alexandrescu, Mottaqiallah Taouil, Geert Jan Schrijen, Jaan Raik, Luca Sterpone, Giovanni Squillero, Zoya Dyka:
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems. DATE 2020: 388-393 - [c52]Kai Lehniger, Marcin J. Aftowicz, Peter Langendörfer, Zoya Dyka:
Challenges of Return-Oriented-Programming on the Xtensa Hardware Architecture. DSD 2020: 154-158 - [c51]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Mamathamba Kalishettyhalli Mahadevaiaha, Ievgen Kabin, Christian Wenger, Peter Langendörfer:
Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks. DSD 2020: 238-245 - [c50]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendörfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276 - [c49]Dan Klann, Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA. DTIS 2020: 1-2 - [c48]R. Kovtun, Sergiy Radchenko, Andrii Netreba, Olexandr O. Sudakov, Roman Natarov, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Exploiting EEG Signals for Eye Motion Tracking. EWDTS 2020: 1-5 - [c47]Dmytro Petryk, Zoya Dyka, Jens Katzer, Peter Langendörfer:
Metal Fillers as Potential Low Cost Countermeasure against Optical Fault Injection Attacks. EWDTS 2020: 1-6 - [c46]Ievgen Kabin, Zoya Dyka, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resistance of the Montgomery kP Algorithm against Simple SCA: Theory and Practice. LATS 2020: 1-6 - [c45]Marcin Aftowicz, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attacks against $kP$ Algorithm Using K-Means and PCA. MECO 2020: 1-7 - [c44]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Dan Klann, Oxana Shamilyan, Peter Langendörfer:
No Resilience without Security. MECO 2020: 1-5 - [c43]Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Automated Simple Analysis Attack. MECO 2020: 1-4 - [c42]Roman Natarov, Zoya Dyka, Ruslan Bohovyk, Mykhailo Fedoriuk, Dmytro Isaev, Oleksandr O. Sudakov, Oleksandr Maksymyuk, Oleg Krishtal, Peter Langendörfer:
Artefacts in EEG Signals Epileptic Seizure Prediction using Edge Devices. MECO 2020: 1-3 - [c41]Roman Natarov, Oleksandr O. Sudakov, Zoya Dyka, Ievgen Kabin, Oleksandr Maksymyuk, Olena Iegorova, Oleg Krishtal, Peter Langendörfer:
Resilience Aspects in Distributed Wireless Electroencephalographic Sampling. MECO 2020: 1-7 - [c40]Dmytro Petryk, Zoya Dyka, Peter Langendörfer:
Sensitivity of Standard Library Cells to Optical Fault Injection Attacks in IHP 250 nm Technology. MECO 2020: 1-4
2010 – 2019
- 2019
- [c39]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. DTIS 2019: 1-6 - [c38]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal Attacks Against ECC: From Simulations to ASIC. IOSec/MSTEC/FINSEC@ESORICS 2019: 64-76 - [c37]Zoya Dyka, Ievgen Kabin, Dan Klann, Frank Vater, Peter Langendörfer:
Caution: GALS-ification as a Means against SCA Attacks. EWDTS 2019: 1-6 - [c36]Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Researching Resilience a Holistic Approach. EWDTS 2019: 1-4 - [c35]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication. EWDTS 2019: 1-6 - [c34]Marcin Aftowicz, Dan Klann, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Evaluation of the ECDSA IHP Hardware Accelerator. Krypto-Tag 2019 - [c33]Ievgen Kabin, Marcin Aftowicz, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attack using Machine Learning Algorithms. Krypto-Tag 2019 - [c32]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
ECC Based Secure Authentication Solutions. Krypto-Tag 2019 - [c31]Kai Lehniger, Yauhen Varabei, Marcin Aftowicz, Seyed Ehsan Hashemi Rastegar, Zoya Dyka, Peter Langendörfer:
Using machine learning techniques for hardware performance counter classification and ROP attack detection. Krypto-Tag 2019 - [c30]Roman Natarov, Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Edge computing devices assessment for cryptography and biomedical signal analysis. Krypto-Tag 2019 - [c29]Alejandro Sosa, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack. Krypto-Tag 2019 - [c28]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. Krypto-Tag 2019 - [c27]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference. MECO 2019: 1-3 - [c26]Ievgen Kabin, Marcin Aftowicz, Yauhen Varabei, Dan Klann, Zoya Dyka, Peter Langendörfer:
Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods. NTMS 2019: 1-7 - [c25]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. NTMS 2019: 1-6 - [c24]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. PIMRC Workshops 2019: 1-6 - [c23]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. ReConFig 2019: 1-5 - [i7]Maksim Jenihhin, Said Hamdioui, Matteo Sonza Reorda, Milos Krstic, Peter Langendörfer, Christian Sauer, Anton Klotz, Michael Hübner, Jörg Nolte, Heinrich Theodor Vierhaus, Georgios N. Selimis, Dan Alexandrescu, Mottaqiallah Taouil, Geert Jan Schrijen, Jaan Raik, Luca Sterpone, Giovanni Squillero, Zoya Dyka:
RESCUE: Interdependent Challenges of Reliability, Security and Quality in Nanoelectronic Systems. CoRR abs/1912.01561 (2019) - 2018
- [j2]Dan Kreiser, Zoya Dyka, Stephan Kornemann, Christian Wittke, Ievgen Kabin, Oliver Stecklina, Peter Langendörfer:
On Wireless Channel Parameters for Key Generation in Industrial Environments. IEEE Access 6: 79010-79025 (2018) - [c22]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Unified field multiplier for ECC: Inherent resistance against horizontal SCA attacks. DTIS 2018: 1-4 - [c21]Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Low-energy key exchange for automation systems. DTIS 2018: 1-5 - [c20]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Comments On: Constant Time Modular Inversion. Krypto-Tag 2018 - [c19]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. Krypto-Tag 2018 - [c18]Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
HCCA against Montgomery kP Design. Krypto-Tag 2018 - [c17]Dmytro Petryk, Zoya Dyka, Peter Langendörfer:
Optical Fault Injections: Most Often Used Setups. Krypto-Tag 2018 - [c16]Christian Wittke, Zoya Dyka, Peter Langendörfer:
Placement of Gates in ECC Designs. Krypto-Tag 2018 - [c15]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Horizontal Address-Bit DEMA against ECDSA. NTMS 2018: 1-7 - [c14]Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendörfer:
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. ReConFig 2018: 1-6 - [c13]Ievgen Kabin, Dan Kreiser, Zoya Dyka, Peter Langendörfer:
FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. ReConFig 2018: 1-7 - [i6]Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendörfer:
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe. IACR Cryptol. ePrint Arch. 2018: 1181 (2018) - 2017
- [c12]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks. EWDTS 2017: 1-7 - [c11]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. ICICS 2017: 225-235 - [c10]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Horizontal address-bit DPA against montgomery kP implementation. ReConFig 2017: 1-8 - 2016
- [c9]Zoya Dyka, Estuardo Alpirez Bock, Ievgen Kabin, Peter Langendörfer:
Inherent Resistance of Efficient ECC Designs against SCA Attacks. NTMS 2016: 1-5 - [c8]Christian Wittke, Zoya Dyka, Peter Langendörfer:
Comparison of EM Probes Using SEMA of an ECC Design. NTMS 2016: 1-5 - [c7]Estuardo Alpirez Bock, Zoya Dyka, Peter Langendörfer:
Increasing the Robustness of the Montgomery kP-Algorithm Against SCA by Modifying Its Initialization. SECITC 2016: 167-178 - [c6]Christian Wittke, Zoya Dyka, Oliver Skibitzki, Peter Langendörfer:
Preparation of SCA Attacks: Successfully Decapsulating BGA Packages. SECITC 2016: 240-247 - 2015
- [c5]Zoya Dyka, Christian Wittke, Peter Langendörfer:
Clockwise Randomization of the Observable Behaviour of Crypto ASICs to Counter Side Channel Attacks. DSD 2015: 551-554 - [i5]Christian Wittke, Zoya Dyka, Peter Langendörfer:
Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA. IACR Cryptol. ePrint Arch. 2015: 100 (2015) - [i4]Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:
Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. IACR Cryptol. ePrint Arch. 2015: 442 (2015) - 2014
- [i3]Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:
Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis. IACR Cryptol. ePrint Arch. 2014: 342 (2014) - [i2]Thomas Basmer, Christian Wittke, Zoya Dyka, Peter Langendörfer:
How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA. IACR Cryptol. ePrint Arch. 2014: 993 (2014) - 2013
- [p1]Zoya Dyka, Peter Langendörfer:
Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks. Wireless Networks and Security 2013: 303-328 - 2012
- [b1]Zoya Dyka:
Analyse und Vorhersage des Flächen- und Energieverbrauches optimaler Hardware Polynom-Multiplizierer für GF(2n) für elliptische Kurven Kryptographie. Brandenburg University of Technology, 2012, pp. 1-252 - [c4]Zoya Dyka, Christian Walczyk, Damian Walczyk, Christian Wenger, Peter Langendörfer:
Side channel attacks and the non volatile memory of the future. CASES 2012: 13-16 - [c3]Zoya Dyka, Peter Langendörfer, Frank Vater, Steffen Peter:
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k). NTMS 2012: 1-6 - 2011
- [c2]Zoya Dyka, Peter Langendörfer, Frank Vater:
Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ). WEWoRC 2011: 137-150
2000 – 2009
- 2007
- [i1]Zoya Dyka, Peter Langendörfer:
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method. CoRR abs/0710.4810 (2007) - 2006
- [j1]Krzysztof Piotrowski, Peter Langendörfer, Oliver Maye, Zoya Dyka:
Protecting privacy in e-cash schemes by securing hidden identity approaches against statistical attacks. Internet Res. 16(2): 159-169 (2006) - 2005
- [c1]Zoya Dyka, Peter Langendörfer:
Area Efficient Hardware Implementation of Elliptic Curve Cryptography by Iteratively Applying Karatsuba's Method. DATE 2005: 70-75
Coauthor Index
aka: Marcin J. Aftowicz
aka: Peter Langendoerfer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint