Lukasz Chmielewski

Orcid: 0000-0001-8978-5235

Affiliations:
  • Masaryk University, Brno, Czech Republic
  • Radboud University, Nijmegen, The Netherland (former)
  • Riscure Security Lab, Delft (former)


According to our database1, Lukasz Chmielewski authored at least 42 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Faster signature verification with 3-dimensional decomposition.
IACR Cryptol. ePrint Arch., 2025

ECTester: Reverse-engineering side-channel countermeasures of ECC implementations.
IACR Cryptol. ePrint Arch., 2025

SoK: Reassessing Side-Channel Vulnerabilities and Countermeasures in PQC Implementations.
IACR Cryptol. ePrint Arch., 2025

Revisiting the analysis of references among Common Criteria certified products.
Comput. Secur., 2025

BarraCUDA: Edge GPUs do Leak DNN Weights.
Proceedings of the 34th USENIX Security Symposium, 2025

Large-Scale Security Analysis of Hardware Wallets.
Proceedings of the Availability, Reliability and Security, 2025

2024
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Towards Explainable Side-Channel Leakage: Unveiling the Secrets of Microarchitecture.
IACR Cryptol. ePrint Arch., 2024

Update to the Sca25519 Library: Mitigating Tearing-based Side-channel Attacks.
IACR Cryptol. ePrint Arch., 2024

sec-certs: Examining the security certification practice for better vulnerability mitigation.
Comput. Secur., 2024

Chain of Trust: Unraveling References Among Common Criteria Certified Products.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

CNN Architecture Extraction on Edge GPU.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024

Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
SoK: SCA-secure ECC in software - mission impossible?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs.
CoRR, 2023

2022
Deep Learning on Side-Channel Analysis.
Security and Artificial Intelligence, 2022

Protecting the Most Significant Bits in Scalar Multiplication Algorithms.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2022

Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
SCA-secure ECC in software - mission impossible?
IACR Cryptol. ePrint Arch., 2021

Evaluating the ROCKY Countermeasure for Side-Channel Leakage.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

On Reverse Engineering Neural Network Implementation on GPU.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Systematic Side-Channel Analysis of Curve25519 with Machine Learning.
J. Hardw. Syst. Secur., 2020

Fault Injection as an Oscilloscope: Fault Correlation Analysis.
IACR Cryptol. ePrint Arch., 2020

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning.
IACR Cryptol. ePrint Arch., 2020

Network Analysis of Technology Stocks using Market Correlation.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

2019
Neural Network Model Assessment for Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Location, Location, Location: Revisiting Modeling and Exploitation for Location-Based Side Channel Leakages.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
SCA-Resistance for AES: How Cheap Can We Go?
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version).
IACR Cryptol. ePrint Arch., 2017

Side-Channel Based Intrusion Detection for Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Attacking Embedded ECC Implementations Through cmov Side Channels.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Online Template Attacks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

2009
Client-Server Password Recovery (Extended Abstract)
CoRR, 2009

Client-Server Password Recovery.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Using JASON to secure SOA.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

Fuzzy Private Matching (Extended Abstract).
Proceedings of the The Third International Conference on Availability, 2008

2007
Remote Management and Secure Application Development for Pervasive Home Systems Using JASON.
Proceedings of the Third International Workshop on Security, 2007


  Loading...