default search action
Ievgen Kabin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Unsupervised Horizontal Iterative Attack against Hardware Elliptic Curve Scalar Multiplication Using Machine Learning. Future Internet 16(2): 45 (2024) - [j8]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Advantages of unsupervised learning analysis methods in single-trace SCA attacks. Microprocess. Microsystems 105: 104994 (2024) - [c58]Ievgen Kabin, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer:
Static Power Consumption as a New Side-Channel Analysis Threat to Elliptic Curve Cryptography Implementations. CSR 2024: 884-889 - [c57]Ievgen Kabin, Jan Schäffner, Alkistis Aikaterini Sigourou, Dmytro Petryk, Zoya Dyka, Dominik Klein, Sven Freud, Peter Langendoerfer:
Stealth Attacks on PCBs: An Experimental Plausibility Analysis. CSR 2024: 905-912 - [c56]Ievgen Kabin, Peter Langendoerfer, Zoya Dyka:
Exploiting Static Power Consumption in Side-Channel Analysis. LATS 2024: 1-4 - [c55]Zoya Dyka, Ievgen Kabin, Marcin Brzozowski, Goran Panic, Cristiano Calligaro, Milos Krstic, Peter Langendoerfer:
On the Influence of Cell Libraries and Other Parameters to SCA Resistance of Crypto IP Cores. MECO 2024: 1-5 - [c54]Dmytro Petryk, Ievgen Kabin, Peter Langendörfer, Zoya Dyka:
On the Importance of Reproducibility of Experimental Results Especially in the Domain of Security. MECO 2024: 1-5 - [i23]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps. CoRR abs/2404.06159 (2024) - [i22]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Oleksandr O. Sudakov, Andrii Cherninskyi, Marcin Brzozowski, Peter Langendoerfer:
Intelligence and Motion Models of Continuum Robots: an Overview. CoRR abs/2404.06171 (2024) - [i21]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Resilient Movement Planning for Continuum Robots. CoRR abs/2404.06178 (2024) - [i20]Dmytro Petryk, Zoya Dyka, Ievgen Kabin, Anselm Breitenreiter, Jan Schäffner, Milos Krstic:
Laser Fault Injection Attacks against Radiation Tolerant TMR Registers. CoRR abs/2407.06751 (2024) - [i19]Dmytro Petryk, Zoya Dyka, Milos Krstic, Jan Belohoubek, Petr Fiser, Frantisek Steiner, Tomás Blecha, Peter Langendörfer, Ievgen Kabin:
On the Influence of the Laser Illumination on the Logic Cells Current Consumption. CoRR abs/2407.06758 (2024) - [i18]Dmytro Petryk, Ievgen Kabin, Peter Langendörfer, Zoya Dyka:
On the Importance of Reproducibility of Experimental Results Especially in the Domain of Security. CoRR abs/2407.06760 (2024) - [i17]Sze Hei Li, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer, Ievgen Kabin:
Practical Investigation on the Distinguishability of Longa's Atomic Patterns. CoRR abs/2409.11868 (2024) - 2023
- [b1]Ievgen Kabin:
Horizontal address-bit SCA attacks against ECC and appropriate countermeasures. Brandenburg University of Technology, Cottbus, Germany, BTU Cottbus - Senftenberg 2023 - [j7]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Oleksandr O. Sudakov, Andrii Cherninskyi, Marcin Brzozowski, Peter Langendoerfer:
Intelligence and Motion Models of Continuum Robots: An Overview. IEEE Access 11: 60988-61003 (2023) - [c53]Soundes Marzougui, Ievgen Kabin, Juliane Krämer, Thomas Aulbach, Jean-Pierre Seifert:
On the Feasibility of Single-Trace Attacks on the Gaussian Sampler Using a CDT. COSADE 2023: 149-169 - [c52]Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCA. CSR 2023: 580-585 - [c51]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Non-Profiled Semi-Supervised Horizontal Attack Against Elliptic Curve Scalar Multiplication Using Support Vector Machines. DSD 2023: 708-713 - [c50]Ievgen Kabin, Peter Langendoerfer, Zoya Dyka:
Vulnerability of Atomic Patterns to Simple SCA. EWDTS 2023: 1-4 - [c49]Dmytro Petryk, Zoya Dyka, Milos Krstic, Jan Belohoubek, Petr Fiser, Frantisek Steiner, Tomás Blecha, Peter Langendörfer, Ievgen Kabin:
On the Influence of the Laser Illumination on the Logic Cells Current Consumption : First measurement results. ICECS 2023: 1-6 - [c48]Alkistis Aikaterini Sigourou, Ievgen Kabin, Peter Langendörfer, Nicolas Sklavos, Zoya Dyka:
Successful Simple Side Channel Analysis: Vulnerability of an atomic pattern $kP$ algorithm implemented with a constant time crypto library to simple electromagnetic analysis attacks. MECO 2023: 1-6 - 2022
- [j6]Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Atomicity and Regularity Principles Do Not Ensure Full Resistance of ECC Designs against Single-Trace Attacks. Sensors 22(8): 3083 (2022) - [c47]Zoya Dyka, Ievgen Kabin, Marcin Brzozowski, Goran Panic, Cristiano Calligaro, Milos Krstic, Peter Langendoerfer:
On the SCA Resistance of Crypto IP Cores. LATS 2022: 1-2 - [c46]Dmytro Petryk, Zoya Dyka, Ievgen Kabin, Anselm Breitenreiter, Jan Schäffner, Milos Krstic:
Laser Fault Injection Attacks against Radiation Tolerant TMR Registers. LATS 2022: 1-2 - [c45]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Distributed Artificial Intelligence as a Means to Achieve Self-X-Functions for Increasing Resilience: the First Steps. MECO 2022: 1-6 - [i16]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer:
Unified Field Multiplier for ECC: Inherent Resistance against Horizontal SCA Attacks. CoRR abs/2201.01147 (2022) - [i15]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendoerfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. CoRR abs/2201.01153 (2022) - [i14]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendoerfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. CoRR abs/2201.01158 (2022) - [i13]R. Kovtun, Sergiy Radchenko, Andrii Netreba, Oleksandr O. Sudakov, Roman Natarov, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Exploiting EEG Signals for Eye Motion Tracking. CoRR abs/2201.01181 (2022) - [i12]Roman Natarov, Oleksandr O. Sudakov, Zoya Dyka, Ievgen Kabin, Oleksandr Maksymyuk, Olena Iegorova, Oleg Krishtal, Peter Langendörfer:
Resilience Aspects in Distributed Wireless Electroencephalographic Sampling. CoRR abs/2201.01272 (2022) - [i11]Marcin Aftowicz, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendoerfer:
Horizontal SCA Attacks against kP Algorithm Using K-Means and PCA. CoRR abs/2201.01711 (2022) - [i10]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendoerfer:
Clustering versus Statistical Analysis for SCA: when Machine Learning is Better. CoRR abs/2201.01717 (2022) - [i9]Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendoerfer:
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. CoRR abs/2201.02007 (2022) - [i8]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendoerfer:
Methods for Increasing the Resistance of Cryptographic Designs against Horizontal DPA Attacks. CoRR abs/2201.02391 (2022) - [i7]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. CoRR abs/2201.02866 (2022) - [i6]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
Horizontal Attacks against ECC: from Simulations to ASIC. CoRR abs/2201.02868 (2022) - [i5]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Michael Kuba, Peter Langendoerfer:
Octopuses: biological facts and technical solutions. CoRR abs/2201.07885 (2022) - [i4]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendoerfer:
On the Complexity of Attacking Elliptic Curve Based Authentication Chips. CoRR abs/2201.09631 (2022) - 2021
- [j5]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendoerfer:
Resistance of the Montgomery Ladder Against Simple SCA: Theory and Practice. J. Electron. Test. 37(3): 289-303 (2021) - [j4]Ievgen Kabin, Zoya Dyka, Dan Klann, Jan Schäffner, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. Microprocess. Microsystems 80: 103480 (2021) - [j3]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Ievgen Kabin, Jens Katzer, Jan Schäffner, Peter Langendörfer:
Sensitivity of HfO2-based RRAM Cells to Laser Irradiation. Microprocess. Microsystems 87: 104376 (2021) - [c44]Ievgen Kabin, Dan Klann, Zoya Dyka, Peter Langendoerfer:
Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA Attacks. CSR 2021: 273-280 - [c43]Alejandro Sosa, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Simulation of Electromagnetic Emanation of Cryptographic ICs: Tools, Methods, Problems. EWDTS 2021: 1-5 - [c42]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendoerfer:
EC Scalar Multiplication: Successful Simple Address-Bit SCA Attack against Atomic Patterns. LATS 2021: 1-2 - [c41]Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Clustering versus Statistical Analysis for SCA: when Machine Learning is Better. MECO 2021: 1-5 - [c40]Zoya Dyka, Ievgen Kabin, Dan Klann, Peter Langendörfer:
Multiplier as a Mean for Reducing Vulnerability of Atomic Patterns to Horizontal Address-Bit Attacks. MECO 2021: 1-6 - [c39]Oxana Shamilyan, Ievgen Kabin, Zoya Dyka, Michael Kuba, Peter Langendörfer:
Octopuses: biological facts and technical solutions. MECO 2021: 1-7 - [c38]Ievgen Kabin, Zoya Dyka, Dan Klann, Marcin Aftowicz, Peter Langendörfer:
FFT based Horizontal SCA Attack against ECC. NTMS 2021: 1-5 - [i3]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Mamathamba Kalishettyhalli Mahadevaiaha, Ievgen Kabin, Christian Wenger, Peter Langendörfer:
Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks. CoRR abs/2103.12435 (2021) - [i2]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
EC Scalar Multiplication: Successful Simple Address Bit SCA Attack against Atomic Patterns. CoRR abs/2106.12321 (2021) - 2020
- [j2]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Methods increasing inherent resistance of ECC designs against horizontal attacks. Integr. 73: 50-67 (2020) - [c37]Dmytro Petryk, Zoya Dyka, Eduardo Pérez, Mamathamba Kalishettyhalli Mahadevaiaha, Ievgen Kabin, Christian Wenger, Peter Langendörfer:
Evaluation of the Sensitivity of RRAM Cells to Optical Fault Injection Attacks. DSD 2020: 238-245 - [c36]Ievgen Kabin, Zoya Dyka, Dan Klann, Nele Mentens, Lejla Batina, Peter Langendörfer:
Breaking a fully Balanced ASIC Coprocessor Implementing Complete Addition Formulas on Weierstrass Elliptic Curves. DSD 2020: 270-276 - [c35]Dan Klann, Marcin Aftowicz, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Integration and Implementation of four different Elliptic Curves in a single high-speed Design considering SCA. DTIS 2020: 1-2 - [c34]R. Kovtun, Sergiy Radchenko, Andrii Netreba, Olexandr O. Sudakov, Roman Natarov, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Exploiting EEG Signals for Eye Motion Tracking. EWDTS 2020: 1-5 - [c33]Ievgen Kabin, Zoya Dyka, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resistance of the Montgomery kP Algorithm against Simple SCA: Theory and Practice. LATS 2020: 1-6 - [c32]Marcin Aftowicz, Ievgen Kabin, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attacks against $kP$ Algorithm Using K-Means and PCA. MECO 2020: 1-7 - [c31]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Dan Klann, Oxana Shamilyan, Peter Langendörfer:
No Resilience without Security. MECO 2020: 1-5 - [c30]Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Automated Simple Analysis Attack. MECO 2020: 1-4 - [c29]Roman Natarov, Oleksandr O. Sudakov, Zoya Dyka, Ievgen Kabin, Oleksandr Maksymyuk, Olena Iegorova, Oleg Krishtal, Peter Langendörfer:
Resilience Aspects in Distributed Wireless Electroencephalographic Sampling. MECO 2020: 1-7
2010 – 2019
- 2019
- [c28]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal DPA Attacks against ECC: Impact of Implemented Field Multiplication Formula. DTIS 2019: 1-6 - [c27]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Horizontal Attacks Against ECC: From Simulations to ASIC. IOSec/MSTEC/FINSEC@ESORICS 2019: 64-76 - [c26]Zoya Dyka, Ievgen Kabin, Dan Klann, Frank Vater, Peter Langendörfer:
Caution: GALS-ification as a Means against SCA Attacks. EWDTS 2019: 1-6 - [c25]Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Researching Resilience a Holistic Approach. EWDTS 2019: 1-4 - [c24]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Fast and Secure Unified Field Multiplier for ECC Based on the 4-Segment Karatsuba Multiplication. EWDTS 2019: 1-6 - [c23]Marcin Aftowicz, Dan Klann, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Evaluation of the ECDSA IHP Hardware Accelerator. Krypto-Tag 2019 - [c22]Ievgen Kabin, Marcin Aftowicz, Dan Klann, Yauhen Varabei, Zoya Dyka, Peter Langendörfer:
Horizontal SCA Attack using Machine Learning Algorithms. Krypto-Tag 2019 - [c21]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
ECC Based Secure Authentication Solutions. Krypto-Tag 2019 - [c20]Roman Natarov, Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Peter Langendörfer:
Edge computing devices assessment for cryptography and biomedical signal analysis. Krypto-Tag 2019 - [c19]Alejandro Sosa, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Impact of the Sampling Rate on the Success of Horizontal DEMA Attack. Krypto-Tag 2019 - [c18]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. Krypto-Tag 2019 - [c17]Zoya Dyka, Elisabeth Vogel, Ievgen Kabin, Marcin Aftowicz, Dan Klann, Peter Langendörfer:
Resilience more than the Sum of Security and Dependability: Cognition is what makes the Difference. MECO 2019: 1-3 - [c16]Ievgen Kabin, Marcin Aftowicz, Yauhen Varabei, Dan Klann, Zoya Dyka, Peter Langendörfer:
Horizontal Attacks using K-Means: Comparison with Traditional Analysis Methods. NTMS 2019: 1-7 - [c15]Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Complexity of Attacking Commercial Authentication Products. NTMS 2019: 1-6 - [c14]Yauhen Varabei, Ievgen Kabin, Zoya Dyka, Dan Klann, Peter Langendörfer:
Intelligent Clustering as a Means to Improve K-means Based Horizontal Attacks. PIMRC Workshops 2019: 1-6 - [c13]Ievgen Kabin, Alejandro Sosa, Zoya Dyka, Dan Klann, Peter Langendörfer:
On the Influence of the FPGA Compiler Optimization Options on the Success of the Horizontal Attack. ReConFig 2019: 1-5 - 2018
- [j1]Dan Kreiser, Zoya Dyka, Stephan Kornemann, Christian Wittke, Ievgen Kabin, Oliver Stecklina, Peter Langendörfer:
On Wireless Channel Parameters for Key Generation in Industrial Environments. IEEE Access 6: 79010-79025 (2018) - [c12]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Unified field multiplier for ECC: Inherent resistance against horizontal SCA attacks. DTIS 2018: 1-4 - [c11]Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
Low-energy key exchange for automation systems. DTIS 2018: 1-5 - [c10]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Comments On: Constant Time Modular Inversion. Krypto-Tag 2018 - [c9]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. Krypto-Tag 2018 - [c8]Dan Kreiser, Zoya Dyka, Ievgen Kabin, Peter Langendörfer:
HCCA against Montgomery kP Design. Krypto-Tag 2018 - [c7]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Horizontal Address-Bit DEMA against ECDSA. NTMS 2018: 1-7 - [c6]Zoya Dyka, Dan Kreiser, Ievgen Kabin, Peter Langendörfer:
Flexible FPGA ECDSA Design with a Field Multiplier Inherently Resistant against HCCA. ReConFig 2018: 1-6 - [c5]Ievgen Kabin, Dan Kreiser, Zoya Dyka, Peter Langendörfer:
FPGA Implementation of ECC: Low-Cost Countermeasure against Horizontal Bus and Address-Bit SCA. ReConFig 2018: 1-7 - [i1]Christian Wittke, Ievgen Kabin, Dan Klann, Zoya Dyka, Anton Datsuk, Peter Langendörfer:
Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe. IACR Cryptol. ePrint Arch. 2018: 1181 (2018) - 2017
- [c4]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Evaluation of resistance of ECC designs protected by different randomization countermeasures against horizontal DPA attacks. EWDTS 2017: 1-7 - [c3]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Methods for Increasing the Resistance of Cryptographic Designs Against Horizontal DPA Attacks. ICICS 2017: 225-235 - [c2]Ievgen Kabin, Zoya Dyka, Dan Kreiser, Peter Langendörfer:
Horizontal address-bit DPA against montgomery kP implementation. ReConFig 2017: 1-8 - 2016
- [c1]Zoya Dyka, Estuardo Alpirez Bock, Ievgen Kabin, Peter Langendörfer:
Inherent Resistance of Efficient ECC Designs against SCA Attacks. NTMS 2016: 1-5
Coauthor Index
aka: Peter Langendoerfer
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint