![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Dan Klann
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i9]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendoerfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. CoRR abs/2201.01153 (2022) - [i8]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendoerfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. CoRR abs/2201.01158 (2022) - [i7]Marcin Aftowicz, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendoerfer:
Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA. CoRR abs/2201.01711 (2022) - [i6]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. CoRR abs/2201.02866 (2022) - [i5]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal Attacks against ECC: from Simulations to ASIC. CoRR abs/2201.02868 (2022) - [i4]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendoerfer:
On the Complexity of Attacking Elliptic Curve Based Authentication Chips. CoRR abs/2201.09631 (2022) - 2021
- [j4]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendoerfer:
Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice. J. Electron. Test. 37(3): 289-303 (2021) - [j3]Elisabeth Vogel
, Zoya Dyka, Dan Klann, Peter Langendörfer:
Resilience in the Cyberworld: Definitions, Features and Models. Future Internet 13(11): 293 (2021) - [j2]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. Microprocess. Microsystems 80: 103480 (2021) - [c23]Ievgen Kabin, Dan Klann, Zoya Dyka, Peter Langendoerfer:
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. CSR 2021: 273-280 - [c22]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns. LATS 2021: 1-2 - [c21]Zoya Dyka, Ievgen Kabin, Dan Klann, Peter Langendörfer:
Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks. MECO 2021: 1-6 - [c20]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendörfer:
FFT based Horizontal SCA Attack against ECC. NTMS 2021: 1-5 - [i3]Elisabeth Vogel, Zoya Dyka, Dan Klann, Peter Langendörfer:
Resilience in the Cyber World: Definitions, Features and Models. CoRR abs/2105.10235 (2021) - [i2]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns. CoRR abs/2106.12321 (2021) - 2020
- [j1]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Methods increasing inherent resistance of ECC designs against horizontal attacks. Integr. 73: 50-67 (2020) - [c19]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens
, Lejla Batina, Peter Langendörfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276 - [c18]Dan Klann, Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA. DTIS 2020: 1-2 - [c17]Ievgen Kabin, Zoya Dyka, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resistance of the Montgomery kP Algorithm against Simple SCA: Theory and Practice. LATS 2020: 1-6 - [c16]Marcin Aftowicz
, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attacks against $kP$ Algorithm Using K-Means and PCA. MECO 2020: 1-7 - [c15]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Dan Klann, Oxana Shamilyan, Peter Langendörfer:
No Resilience without Security. MECO 2020: 1-5
2010 – 2019
- 2019
- [c14]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. DTIS 2019: 1-6 - [c13]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal Attacks Against ECC: From Simulations to ASIC. IOSec/MSTEC/FINSEC@ESORICS 2019: 64-76 - [c12]Zoya Dyka, Ievgen Kabin, Dan Klann, Frank Vater, Peter Langendörfer:
Caution: GALS-ification as a Means against SCA Attacks. EWDTS 2019: 1-6 - [c11]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication. EWDTS 2019: 1-6 - [c10]Marcin Aftowicz, Dan Klann, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Evaluation of the ECDSA IHP Hardware Accelerator. Krypto-Tag 2019 - [c9]Ievgen Kabin, Marcin Aftowicz, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attack using Machine Learning Algorithms. Krypto-Tag 2019 - [c8]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
ECC Based Secure Authentication Solutions. Krypto-Tag 2019 - [c7]Alejandro Sosa, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack. Krypto-Tag 2019 - [c6]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. Krypto-Tag 2019 - [c5]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference. MECO 2019: 1-3 - [c4]Ievgen Kabin, Marcin Aftowicz, Yauhen Varabei, Dan Klann, Zoya Dyka, Peter Langendörfer:
Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods. NTMS 2019: 1-7 - [c3]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. NTMS 2019: 1-6 - [c2]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. PIMRC Workshops 2019: 1-6 - [c1]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. ReConFig 2019: 1-5 - 2018
- [i1]Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendörfer:
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe. IACR Cryptol. ePrint Arch. 2018: 1181 (2018)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint