Rosita: Towards automatic elimination of power-analysis leakage in ciphers MA Shelton, N Samwel, L Batina, F Regazzoni, M Wagner, Y Yarom arXiv preprint arXiv:1912.05183, 2019 | 82 | 2019 |
DPA on hardware implementations of Ascon and Keyak N Samwel, J Daemen Proceedings of the Computing Frontiers Conference, 415-424, 2017 | 48 | 2017 |
Breaking ed25519 in wolfssl N Samwel, L Batina, G Bertoni, J Daemen, R Susella Topics in Cryptology–CT-RSA 2018: The Cryptographers' Track at the RSA …, 2018 | 45 | 2018 |
Friet: An Authenticated Encryption Scheme with Built-in Fault Detection T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ... Annual International Conference on the Theory and Applications of …, 2020 | 37 | 2020 |
Screen gleaning: A screen reading TEMPEST attack on mobile devices exploiting an electromagnetic side channel Z Liu, N Samwel, L Weissbart, Z Zhao, D Lauret, L Batina, M Larson arXiv preprint arXiv:2011.09877, 2020 | 32 | 2020 |
Practical fault injection on deterministic signatures: the case of EdDSA N Samwel, L Batina Progress in Cryptology–AFRICACRYPT 2018: 10th International Conference on …, 2018 | 25 | 2018 |
Genetic algorithm-based electromagnetic fault injection A Maldini, N Samwel, S Picek, L Batina 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), 35-42, 2018 | 23 | 2018 |
Rosita++: Automatic higher-order leakage elimination from cryptographic code MA Shelton, Ł Chmielewski, N Samwel, M Wagner, L Batina, Y Yarom Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 22 | 2021 |
Optimizing electromagnetic fault injection with genetic algorithms A Maldini, N Samwel, S Picek, L Batina Automated Methods in Cryptographic Fault Analysis, 281-300, 2019 | 14 | 2019 |
Towards lightweight cryptographic primitives with built-in fault-detection T Simon, L Batina, J Daemen, V Grosso, PMC Massolino, ... Cryptology ePrint Archive, 2018 | 14 | 2018 |
Nonce@ Once: A single-trace EM side channel attack on several constant-time elliptic curve implementations in mobile platforms A Monjur, B Yilmaz, F Werner, N Samwel, A Zajic, D Genkin, Y Yarom, ... IEEE European Symposium on Security and Privacy, 2021 | 12 | 2021 |
Online template attack on ECDSA: Extracting keys via the other side N Roelofs, N Samwel, L Batina, J Daemen Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020 | 12 | 2020 |
SCA-secure ECC in software–mission impossible? L Batina, Ł Chmielewski, B Haase, N Samwel, P Schwabe Cryptology ePrint Archive, 2021 | 8 | 2021 |
SoK: SCA-secure ECC in software–mission impossible? L Batina, LM Chmielewski, B Haase, N Samwel, P Schwabe | 5 | 2023 |
Physical Attacks and Countermeasures on Real-World Cryptographic Implementations N Samwel Sl: sn, 2022 | | 2022 |
Side-Channel Analysis of Keccak and Ascon N Samwel | | 2016 |
Face recognition performance analysis: Cohort classifiers M van der Made, R Mahmudlu, H Munawar, M Neikes, N Samwel University of Twente Students Journal of Biometrics and Computer Vision 1 (1), 2015 | | 2015 |