Searched for: author%3A%22Chmielewski%2C+%C5%81ukasz%22
(1 - 4 of 4)
document
Swaminathan, Sudharshan (author), Chmielewski, Łukasz (author), Perin, G. (author), Picek, S. (author)
Side-channel attacks (SCA) focus on vulnerabilities caused by insecure implementations and exploit them to deduce useful information about the data being processed or the data itself through leakages obtained from the device. There have been many studies exploiting these leakages, and most of the state-of-the-art attacks have been shown to...
conference paper 2022
document
Perin, G. (author), Chmielewski, Łukasz (author), Picek, S. (author)
The adoption of deep neural networks for profiled side-channel attacks provides powerful options for leakage detection and key retrieval of secure products. When training a neural network for side-channel analysis, it is expected that the trained model can implement an approximation function that can detect leaking side-channel samples and, at...
journal article 2020
document
Weissbart, L.J.A. (author), Chmielewski, Łukasz (author), Picek, S. (author), Batina, Lejla (author)
Profiling attacks, especially those based on machine learning, proved to be very successful techniques in recent years when considering the side-channel analysis of symmetric-key crypto implementations. At the same time, the results for implementations of asymmetric-key cryptosystems are very sparse. This paper considers several machine learning...
journal article 2020
document
Perin, G. (author), Chmielewski, Łukasz (author), Batina, Lejla (author), Picek, S. (author)
To mitigate side-channel attacks, real-world implementations of public-key cryptosystems adopt state-of-the-art countermeasures based on randomization of the private or ephemeral keys. Usually, for each private key operation, a “scalar blinding” is performed using 32 or 64 randomly generated bits. Nevertheless, horizontal attacks based on a...
journal article 2020
Searched for: author%3A%22Chmielewski%2C+%C5%81ukasz%22
(1 - 4 of 4)