Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis G Perin, Ł Chmielewski, S Picek IACR Transactions on Cryptographic Hardware and Embedded Systems, 337-364, 2020 | 108 | 2020 |
Online template attacks L Batina, Ł Chmielewski, L Papachristodoulou, P Schwabe, M Tunstall Journal of Cryptographic Engineering 9, 21-36, 2019 | 88 | 2019 |
Attacking embedded ECC implementations through cmov side channels E Nascimento, Ł Chmielewski, D Oswald, P Schwabe International Conference on Selected Areas in Cryptography, 99-119, 2016 | 86 | 2016 |
Keep it unsupervised: Horizontal attacks meet deep learning G Perin, Ł Chmielewski, L Batina, S Picek IACR Transactions on Cryptographic Hardware and Embedded Systems, 343-372, 2021 | 49 | 2021 |
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014 | 46 | 2014 |
Applying horizontal clustering side-channel attacks on embedded ECC implementations E Nascimento, Ł Chmielewski International Conference on Smart Card Research and Advanced Applications …, 2017 | 40 | 2017 |
On reverse engineering neural network implementation on GPU Ł Chmielewski, L Weissbart Applied Cryptography and Network Security Workshops: ACNS 2021 Satellite …, 2021 | 37 | 2021 |
A semi-parametric approach for side-channel attacks on protected RSA implementations G Perin, Ł Chmielewski International Conference on Smart Card Research and Advanced Applications, 34-53, 2015 | 35 | 2015 |
Fuzzy private matching L Chmielewski, JH Hoepman 2008 Third International Conference on Availability, Reliability and …, 2008 | 31 | 2008 |
Side-channel based intrusion detection for industrial control systems P Van Aubel, K Papagiannopoulos, Ł Chmielewski, C Doerr Critical Information Infrastructures Security: 12th International Conference …, 2018 | 30 | 2018 |
Fault injection as an oscilloscope: fault correlation analysis A Spruyt, A Milburn, Ł Chmielewski IACR Transactions on Cryptographic Hardware and Embedded Systems, 192-216, 2021 | 26 | 2021 |
Rosita++: Automatic higher-order leakage elimination from cryptographic code MA Shelton, Ł Chmielewski, N Samwel, M Wagner, L Batina, Y Yarom Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 24 | 2021 |
Neural network model assessment for side-channel analysis G Perin, B Ege, L Chmielewski Cryptology ePrint Archive, 2019 | 24 | 2019 |
Systematic side-channel analysis of curve25519 with machine learning L Weissbart, Ł Chmielewski, S Picek, L Batina Journal of Hardware and Systems Security 4 (4), 314-328, 2020 | 21 | 2020 |
Completing the complete ECC formulae with countermeasures Ł Chmielewski, PMC Massolino, J Vliegen, L Batina, N Mentens Journal of Low Power Electronics and Applications 7 (1), 3, 2017 | 17 | 2017 |
Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages C Andrikos, L Batina, L Chmielewski, L Lerman, V Mavroudis, ... Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 16 | 2019 |
Remote management and secure application development for pervasive home systems using Jason B Bos, L Chmielewski, JH Hoepman, TS Nguyen Third International Workshop on Security, Privacy and Trust in Pervasive and …, 2007 | 13 | 2007 |
Using JASON to secure SOA Ł Chmielewski, R Brinkman, JH Hoepman, B Bos Proceedings of the 2008 workshop on Middleware security, 13-18, 2008 | 10 | 2008 |
Breaking dpa-protected kyber via the pair-pointwise multiplication EA Bock, G Banegas, C Brzuska, Ł Chmielewski, K Puniamurthy, M Šorf International Conference on Applied Cryptography and Network Security, 101-130, 2024 | 9 | 2024 |
SCA-secure ECC in software–mission impossible? L Batina, Ł Chmielewski, B Haase, N Samwel, P Schwabe Cryptology ePrint Archive, 2021 | 9 | 2021 |