Lukasz Chmielewski

Orcid: 0000-0001-8978-5235

Affiliations:
  • Radboud University, Nijmegen, The Netherland
  • Riscure Security Lab, Delft (former)


According to our database1, Lukasz Chmielewski authored at least 32 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CNN architecture extraction on edge GPU.
CoRR, 2024

2023
SoK: SCA-secure ECC in software - mission impossible?
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Breaking DPA-protected Kyber via the pair-pointwise multiplication.
IACR Cryptol. ePrint Arch., 2023

BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs.
CoRR, 2023

sec-certs: Examining the security certification practice for better vulnerability mitigation.
CoRR, 2023

2022
Deep Learning on Side-Channel Analysis.
Security and Artificial Intelligence, 2022

Protecting the most significant bits in scalar multiplication algorithms.
IACR Cryptol. ePrint Arch., 2022

2021
Fault Injection as an Oscilloscope: Fault Correlation Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Deep Learning-based Side-channel Analysis against AES Inner Rounds.
IACR Cryptol. ePrint Arch., 2021

Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code.
IACR Cryptol. ePrint Arch., 2021

On Reverse Engineering Neural Network Implementation on GPU.
IACR Cryptol. ePrint Arch., 2021

SCA-secure ECC in software - mission impossible?
IACR Cryptol. ePrint Arch., 2021

Evaluating the ROCKY Countermeasure for Side-Channel Leakage.
Proceedings of the 29th IFIP/IEEE International Conference on Very Large Scale Integration, 2021

2020
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Systematic Side-Channel Analysis of Curve25519 with Machine Learning.
J. Hardw. Syst. Secur., 2020

Network Analysis of Technology Stocks using Market Correlation.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

2019
Online template attacks.
J. Cryptogr. Eng., 2019

Neural Network Model Assessment for Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages.
IACR Cryptol. ePrint Arch., 2019

2018
SCA-Resistance for AES: How Cheap Can We Go?
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations (Extended Version).
IACR Cryptol. ePrint Arch., 2017

Side-Channel Based Intrusion Detection for Industrial Control Systems.
Proceedings of the Critical Information Infrastructures Security, 2017

Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Attacking embedded ECC implementations through cmov side channels.
IACR Cryptol. ePrint Arch., 2016

2015
A Semi-Parametric Approach for Side-Channel Attacks on Protected RSA Implementations.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

2009
Client-Server Password Recovery (Extended Abstract)
CoRR, 2009

Client-Server Password Recovery.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009, 2009

2008
Using JASON to secure SOA.
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008, 2008

2007
Fuzzy Private Matching (Extended Abstract).
IACR Cryptol. ePrint Arch., 2007

Remote Management and Secure Application Development for Pervasive Home Systems Using JASON.
Proceedings of the Third International Workshop on Security, 2007


  Loading...