Online template attacks L Batina, Ł Chmielewski, L Papachristodoulou, P Schwabe, M Tunstall Journal of Cryptographic Engineering 9 (1), 21-36, 2019 | 54 | 2019 |
Attacking embedded ECC implementations through cmov side channels E Nascimento, Ł Chmielewski, D Oswald, P Schwabe International Conference on Selected Areas in Cryptography, 99-119, 2016 | 54 | 2016 |
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014 | 33 | 2014 |
A semi-parametric approach for side-channel attacks on protected RSA implementations G Perin, Ł Chmielewski International Conference on Smart Card Research and Advanced Applications, 34-53, 2015 | 20 | 2015 |
Fuzzy private matching L Chmielewski, JH Hoepman 2008 Third International Conference on Availability, Reliability and …, 2008 | 18 | 2008 |
Neural Network Model Assessment for Side-Channel Analysis. G Perin, B Ege, L Chmielewski IACR Cryptol. ePrint Arch. 2019, 722, 2019 | 14 | 2019 |
Side-channel based intrusion detection for industrial control systems P Van Aubel, K Papagiannopoulos, Ł Chmielewski, C Doerr International Conference on Critical Information Infrastructures Security …, 2017 | 14 | 2017 |
Remote management and secure application development for pervasive home systems using Jason B Bos, L Chmielewski, JH Hoepman, TS Nguyen Third International Workshop on Security, Privacy and Trust in Pervasive and …, 2007 | 12 | 2007 |
Completing the complete ECC formulae with countermeasures Ł Chmielewski, PMC Massolino, J Vliegen, L Batina, N Mentens Journal of Low Power Electronics and Applications 7 (1), 3, 2017 | 10 | 2017 |
Using JASON to secure SOA Ł Chmielewski, R Brinkman, JH Hoepman, B Bos Proceedings of the 2008 workshop on Middleware security, 13-18, 2008 | 10 | 2008 |
Applying horizontal clustering side-channel attacks on embedded ECC implementations E Nascimento, Ł Chmielewski International Conference on Smart Card Research and Advanced Applications …, 2017 | 9 | 2017 |
Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis G Perin, Ł Chmielewski, S Picek IACR Transactions on Cryptographic Hardware and Embedded Systems, 337-364, 2020 | 7* | 2020 |
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ... International Conference on the Theory and Application of Cryptology and …, 2019 | 6 | 2019 |
SCA-Resistance for AES: How Cheap Can We Go? R Chaves, Ł Chmielewski, F Regazzoni, L Batina International Conference on Cryptology in Africa, 107-123, 2018 | 4 | 2018 |
Client-server password recovery Ł Chmielewski, JH Hoepman, P van Rossum OTM Confederated International Conferences" On the Move to Meaningful …, 2009 | 3 | 2009 |
Applying horizontal clustering side-channel attacks on embedded ECC implementations (extended version) E Nascimento, L Chmielewski Cryptology ePrint Archive, Report 2017/1204, 2017 | 2 | 2017 |
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning G Perin, Ł Chmielewski, L Batina, S Picek IACR Transactions on Cryptographic Hardware and Embedded Systems, 343-372, 2021 | 1 | 2021 |
Fault Injection as an Oscilloscope: Fault Correlation Analysis A Spruyt, A Milburn, Ł Chmielewski IACR Transactions on Cryptographic Hardware and Embedded Systems, 192-216, 2021 | | 2021 |
Systematic Side-Channel Analysis of Curve25519 with Machine Learning L Weissbart, Ł Chmielewski, S Picek, L Batina Journal of Hardware and Systems Security 4 (4), 314-328, 2020 | | 2020 |
Trezor One side-channel analysis setup E Gunnarsdóttir, L Batina, L Chmielewski | | 2020 |