This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ~~NOTOC~~ ====== Lukasz Chmielewski ====== <ifauth @user> <callout type="primary" icon="true" title="Add your publications">If you have published anything not in the list, please add the bibliography entry to the list. Instructions can be found in the [[https://gitlab.fi.muni.cz/labak/wiki-publications|GitLab repository]]</callout> <callout type="success" icon="true" title="Don't forget submission table and author shares">Note down also the information on rejections and authorship percentages. We keep track of our lab efforts and author shares are useful for dissertation proposal/dissertation/habilitation/... There is a [[:internal:crocs:submissions|dedicated page where to write them]].</callout> </ifauth> ==== 2024==== * <text size="large">**Breaking DPA-protected Kyber via the pair-pointwise multiplication**</text>\\ [[:publications:authors:estuardo-alpirez-bock|Estuardo Alpirez Bock]], [[:publications:authors:gustavo-banegas|Gustavo Banegas]], [[:publications:authors:chris-brzuska|Chris Brzuska]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:kirthivaasan-puniamurthy|Kirthivaasan Puniamurthy]] and [[:publications:authors:milan-sorf|Milan Šorf]],\\ //Applied Cryptography and Network Security//, Springer Nature, 2024.\\ Keywords: [[:publications:keywords:pqc|pqc]], [[:publications:keywords:side-channel|side-channel]], ++ BibTeX |<code>@Article{2024-acns-bock, title = {Breaking DPA-protected Kyber via the pair-pointwise multiplication}, author = {Estuardo Alpirez Bock and Gustavo Banegas and Chris Brzuska and Lukasz Chmielewski and Kirthivaasan Puniamurthy and Milan Šorf}, booktitle = {Applied Cryptography and Network Security}, publisher = {Springer Nature}, year = {2024}, keywords = {PQC, side-channel}, } </code>++ * <text size="large">**CNN architecture extraction on edge GPU**</text>\\ [[:publications:authors:peter-horvath|Péter Horváth]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:lejla-batina|Lejla Batina]], [[:publications:authors:leo-weissbart|Léo Weissbart]] and [[:publications:authors:yuval-yarom|Yuval Yarom]],\\ //Artificial Intelligence in Hardware Security (AIHWS) Workshop affiliated with ACNS//, Springer Nature, 2024.\\ Keywords: [[:publications:keywords:side-channel|side-channel]], ++ BibTeX |<code>@InProceedings{2024-aihws-horvath, title = {{CNN} architecture extraction on edge {GPU}}, author = {Péter Horváth and Lukasz Chmielewski and Lejla Batina and Léo Weissbart and Yuval Yarom}, booktitle = {Artificial Intelligence in Hardware Security (AIHWS) Workshop affiliated with ACNS}, publisher = {Springer Nature}, year = {2024}, keywords = {side-channel}, } </code>++ <grid><col xs="10" sm="10" lg="10"> * <text size="large">**Chain of Trust: Unraveling References Among Common Criteria Certified Products**</text>\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:jan-jancar|Jan Jancar]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //IFIP International Conference on ICT Systems Security and Privacy Protection//, Springer Nature Switzerland, 2024, .\\ Keywords: [[:publications:keywords:sec-certs|sec-certs]], [[http://dx.doi.org/10.1007/978-3-031-65175-5_14|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404824001974|paper website]], ++ BibTeX |<code>@InProceedings{2024-ifipsec-janovsky, title = {Chain of Trust: Unraveling References Among Common Criteria Certified Products}, author = {Adam Janovsky and Lukasz Chmielewski and Petr Svenda and Jan Jancar and Vashek Matyas}, booktitle = {IFIP International Conference on ICT Systems Security and Privacy Protection}, pages = {}, publisher = {Springer Nature Switzerland}, address = {Cham}, year = {2024}, isbn = {978-3-031-65175-5}, doi = {10.1007/978-3-031-65175-5_14}, url = {https://www.sciencedirect.com/science/article/pii/S0167404824001974}, keywords = {sec-certs}, edition = {volume 710}, editor = {Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://sec-certs.org/about/#research|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis**</text>\\ [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:vojtech-suchanek|Vojtech Suchanek]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:vladimir-sedlacek|Vladimir Sedlacek]] and [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]],\\ //IACR Transactions on Cryptographic Hardware and Embedded Systems//, Ruhr-University of Bochum, 2024, 355–381.\\ Keywords: [[:publications:keywords:side-channel|side-channel]], [[:publications:keywords:ecc|ecc]], {{:publications:pdf:2024-ches-jancar.pdf|pre-print PDF}}, [[http://dx.doi.org/10.46586/tches.v2024.i4.355-381|DOI website]], [[https://tches.iacr.org/index.php/TCHES/article/view/11796|paper website]], ++ BibTeX |<code>@InProceedings{2024-ches-jancar, title = {pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis}, author = {Jan Jancar and Vojtech Suchanek and Petr Svenda and Vladimir Sedlacek and Lukasz Chmielewski}, booktitle = {IACR Transactions on Cryptographic Hardware and Embedded Systems}, publisher = {Ruhr-University of Bochum}, year = {2024}, keywords = {side-channel,ecc}, doi = {10.46586/tches.v2024.i4.355-381}, url = {https://tches.iacr.org/index.php/TCHES/article/view/11796}, pages = {355–381}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://pyecsca.org/papers.html#pyecsca-reverse-engineering-black-box-elliptic-curve-cryptography-via-side-channel-analysis|Details]]</button> </col></grid> <grid><col xs="10" sm="10" lg="10"> * <text size="large">**sec-certs: Examining the security certification practice for better vulnerability mitigation**</text>\\ [[:publications:authors:adam-janovsky|Adam Janovsky]], [[:publications:authors:jan-jancar|Jan Jancar]], [[:publications:authors:petr-svenda|Petr Svenda]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:jiri-michalik|Jiri Michalik]] and [[:publications:authors:vashek-matyas|Vashek Matyas]],\\ //Computers & Security//, 2024.\\ Keywords: [[:publications:keywords:sec-certs|sec-certs]], [[http://dx.doi.org/10.1016/j.cose.2024.103895|DOI website]], [[https://www.sciencedirect.com/science/article/pii/S0167404824001974|paper website]], ++ BibTeX |<code>@Article{2023-seccerts-janovsky, title = {sec-certs: Examining the security certification practice for better vulnerability mitigation}, author = {Adam Janovsky and Jan Jancar and Petr Svenda and Lukasz Chmielewski and Jiri Michalik and Vashek Matyas}, journal = {Computers & Security}, volume = {143}, year = {2024}, issn = {0167-4048}, doi = {10.1016/j.cose.2024.103895}, url = {https://www.sciencedirect.com/science/article/pii/S0167404824001974}, keywords = {sec-certs}, } </code>++ </col><col xs="2" sm="2" lg="2"> <button>[[https://sec-certs.org/about/#research|Details]]</button> </col></grid> ==== 2023==== * <text size="large">**SoK: SCA-secure ECC in software - mission impossible?**</text>\\ [[:publications:authors:lejla-batina|Lejla Batina]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]], [[:publications:authors:björn-haase|Björn Haase]], [[:publications:authors:niels-samwel|Niels Samwel]] and [[:publications:authors:peter-schwabe|Peter Schwabe]],\\ //IACR Trans. Cryptogr. Hardw. Embed. Syst.//, 2023, 557--589.\\ Keywords: [[:publications:keywords:ecc|ecc]], [[:publications:keywords:side-channel|side-channel]], [[http://dx.doi.org/10.46586/TCHES.V2023.I1.557-589|DOI website]], ++ BibTeX |<code>@Article{2023-ches-sok, title = {SoK: SCA-secure {ECC} in software - mission impossible?}, author = {Lejla Batina and Lukasz Chmielewski and Björn Haase and Niels Samwel and Peter Schwabe}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {1}, pages = {557--589}, year = {2023}, doi = {10.46586/TCHES.V2023.I1.557-589}, keywords = {ECC, side-channel}, } </code>++ ==== 2022==== * <text size="large">**Protecting the Most Significant Bits in Scalar Multiplication Algorithms**</text>\\ [[:publications:authors:estuardo-alpirez-bock|Estuardo Alpirez Bock]], [[:publications:authors:lukasz-chmielewski|Lukasz Chmielewski]] and [[:publications:authors:konstantina-miteloudi|Konstantina Miteloudi]],\\ //Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings//, Springer, 2022, volume 13783 of Lecture Notes in Computer Science, 118--137.\\ [[http://dx.doi.org/10.1007/978-3-031-22829-2\_7|DOI website]], ++ BibTeX |<code>@InProceedings{2022-space-msb, title = {Protecting the Most Significant Bits in Scalar Multiplication Algorithms}, author = {Estuardo Alpirez Bock and Lukasz Chmielewski and Konstantina Miteloudi}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, {SPACE} 2022, Jaipur, India, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13783}, pages = {118--137}, publisher = {Springer}, year = {2022}, doi = {10.1007/978-3-031-22829-2\_7}, } </code>++