MHC-II neoantigens shape tumour immunity and response to immunotherapy E Alspach, DM Lussier, AP Miceli, I Kizhvatov, M DuPage, AM Luoma, ... Nature, 1-6, 2019 | 671 | 2019 |
An efficient method for random delay generation in embedded software JS Coron, I Kizhvatov Cryptographic Hardware and Embedded Systems-CHES 2009, 156-170, 2009 | 204 | 2009 |
Analysis and improvement of the random delay countermeasure of CHES 2009 JS Coron, I Kizhvatov International Workshop on Cryptographic Hardware and Embedded Systems, 95-109, 2010 | 156 | 2010 |
Algebraic methods in side-channel collision attacks and practical collision detection A Bogdanov, I Kizhvatov, A Pyshkin International Conference on Cryptology in India, 251-265, 2008 | 67 | 2008 |
Beyond the limits of DPA: combined side-channel collision attacks A Bogdanov, I Kizhvatov IEEE Transactions on Computers 61 (8), 1153-1164, 2012 | 66 | 2012 |
Fast and memory-efficient key recovery in side-channel attacks A Bogdanov, I Kizhvatov, K Manzoor, E Tischhauser, M Witteman Selected Areas in Cryptography (SAC), 2015 | 59 | 2015 |
Improved trace-driven cache-collision attacks against embedded AES implementations JF Gallais, I Kizhvatov, M Tunstall International Workshop on Information Security Applications, 243-257, 2010 | 59 | 2010 |
Efficient and side-channel resistant RSA implementation for 8-bit AVR microcontrollers Z Liu, J Großschädl, I Kizhvatov Workshop on the Security of the Internet of Things-SOCIOT 10, 2010 | 55 | 2010 |
Fault attacks on RSA signatures with partially unknown messages JS Coron, A Joux, I Kizhvatov, D Naccache, P Paillier Cryptographic Hardware and Embedded Systems-CHES 2009, 444-456, 2009 | 51 | 2009 |
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread D Dinu, I Kizhvatov IACR Transactions on Cryptographic Hardware and Embedded Systems 2018 (1), 73-97, 2018 | 38 | 2018 |
Combined implementation attack resistant exponentiation JM Schmidt, M Tunstall, R Avanzi, I Kizhvatov, T Kasper, D Oswald International Conference on Cryptology and Information Security in Latin …, 2010 | 34 | 2010 |
Side channel analysis of AVR XMEGA crypto engine I Kizhvatov Proceedings of the 4th Workshop on Embedded Systems Security, 8, 2009 | 32 | 2009 |
ABC: A new fast flexible stream cipher V Anashin, A Bogdanov, I Kizhvatov, S Kumar ECRYPT Stream Cipher Project Report 1, 2005, 2005 | 28 | 2005 |
Cryptanalysis of the Atmel cipher in SecureMemory, CryptoMemory and CryptoRF A Biryukov, I Kizhvatov, B Zhang International Conference on Applied Cryptography and Network Security, 91-109, 2011 | 22 | 2011 |
Physical Security of Cryptographic Algorithm Implementations I KIZHVATOV | 14 | 2011 |
Error-tolerance in trace-driven cache collision attacks JF Gallais, I Kizhvatov COSADE, Darmstadt, 222-232, 2011 | 13 | 2011 |
Towards fully automated analysis of whiteboxes: Perfect dimensionality reduction for perfect leakage CB Breunesse, I Kizhvatov, R Muijrers, A Spruyt Cryptology ePrint Archive, 2018 | 8 | 2018 |
Analysis of the split mask countermeasure for embedded systems JS Coron, I Kizhvatov Proceedings of the 4th Workshop on Embedded Systems Security, 3, 2009 | 7 | 2009 |
Performance and security aspects of client-side SSL/TLS processing on mobile devices J Großschädl, I Kizhvatov International Conference on Cryptology and Network Security, 44-61, 2010 | 5 | 2010 |
ABC–a New Fast Flexible Stream Cipher Specification, Version 3 V Anashin, A Bogdanov, I Kizhvatov, S Kumar Technical Report, Institute for Information Sciences and Security …, 2006 | 5 | 2006 |