Follow
Niels Samwel
Niels Samwel
Verified email at cs.ru.nl
Title
Cited by
Cited by
Year
Rosita: Towards automatic elimination of power-analysis leakage in ciphers
MA Shelton, N Samwel, L Batina, F Regazzoni, M Wagner, Y Yarom
arXiv preprint arXiv:1912.05183, 2019
822019
DPA on hardware implementations of Ascon and Keyak
N Samwel, J Daemen
Proceedings of the Computing Frontiers Conference, 415-424, 2017
482017
Breaking ed25519 in wolfssl
N Samwel, L Batina, G Bertoni, J Daemen, R Susella
Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018
452018
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Annual International Conference on the Theory and Applications of …, 2020
372020
Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel
Z Liu, N Samwel, L Weissbart, Z Zhao, D Lauret, L Batina, M Larson
arXiv preprint arXiv:2011.09877, 2020
322020
Practical fault injection on deterministic signatures: the case of EdDSA
N Samwel, L Batina
Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018
252018
Genetic algorithm-based electromagnetic fault injection
A Maldini, N Samwel, S Picek, L Batina
2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 35-42, 2018
232018
Rosita++: Automatic higher-order leakage elimination from cryptographic code
MA Shelton, Ł Chmielewski, N Samwel, M Wagner, L Batina, Y Yarom
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
222021
Optimizing electromagnetic fault injection with genetic algorithms
A Maldini, N Samwel, S Picek, L Batina
Automated Methods in Cryptographic Fault Analysis, 281-300, 2019
142019
Towards lightweight cryptographic primitives with built-in fault-detection
T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ...
Cryptology ePrint Archive, 2018
142018
Nonce@ Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms
A Monjur, B Yilmaz, F Werner, N Samwel, A Zajic, D Genkin, Y Yarom, ...
IEEE European Symposium on Security and Privacy, 2021
122021
Online template attack on ECDSA: Extracting keys via the other side
N Roelofs, N Samwel, L Batina, J Daemen
Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020
122020
SCA-secure ECC in software–mission impossible?
L Batina, Ł Chmielewski, B Haase, N Samwel, P Schwabe
Cryptology ePrint Archive, 2021
82021
SoK: SCA-secure ECC in software–mission impossible?
L Batina, LM Chmielewski, B Haase, N Samwel, P Schwabe
52023
Physical Attacks and Countermeasures on Real-World Cryptographic Implementations
N Samwel
Sl: sn, 2022
2022
Side-Channel Analysis of Keccak and Ascon
N Samwel
2016
Face recognition performance analysis: Cohort classifiers
M van der Made, R Mahmudlu, H Munawar, M Neikes, N Samwel
University of Twente Students Journal of Biometrics and Computer Vision 1 (1), 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–17