-
Faster signature verification with 3-dimensional decomposition D - Stať ve sborníkuSUCHÁNEK, Vojtěch; Marek SÝS a Lukasz Michal CHMIELEWSKI. Faster signature verification with 3-dimensional decomposition. In Applied Cryptography and Network Security. Cham: Springer Nature Switzerland, 2026.Podrobněji: https://is.muni.cz/publication/2548365/cs
-
Kraken: Higher-order EM side-channel attacks on DNNs in near and far field D - Stať ve sborníkuHORVATH, Peter; Ilia SHUMAILOV; Lukasz Michal CHMIELEWSKI; Lejla BATINA a Yuval YAROM. Kraken: Higher-order EM side-channel attacks on DNNs in near and far field. In Proceedings of SaTML 2026 (to-appear). 2026.Podrobněji: https://is.muni.cz/publication/2561038/cs
-
BarraCUDA: Edge GPUs do Leak DNN Weights D - Stať ve sborníkuHORVATH, Peter; Lukasz Michal CHMIELEWSKI; Léo WEISSBART a Lejla BATINA. BarraCUDA: Edge GPUs do Leak DNN Weights. In YAROM, Yuval. SEC '25: Proceedings of the 34th USENIX Conference on Security Symposium. Seattle, WA, USA: USENIX Association, 2025, s. 4017-4034, 19 s. ISBN 978-1-939133-52-6.Podrobněji: https://is.muni.cz/publication/2513799/cs
-
ECTester: Reverse-engineering side-channel countermeasures of ECC implementations D - Stať ve sborníkuSUCHÁNEK, Vojtěch; Ján JANČÁR; Jan KVAPIL; Petr ŠVENDA a Lukasz Michal CHMIELEWSKI. ECTester: Reverse-engineering side-channel countermeasures of ECC implementations. Online. In IACR Transactions on Cryptographic Hardware and Embedded Systems. 4. vyd. Německo: Ruhr-University of Bochum, 2025, s. 290-316. ISSN 2569-2925. Dostupné z: https://doi.org/10.46586/tches.v2025.i4.290-316.Podrobněji: https://is.muni.cz/publication/2504037/cs
-
Large-Scale Security Analysis of Hardware Wallets D - Stať ve sborníkuŠORF, Milan; Petr ŠVENDA a Lukasz Michal CHMIELEWSKI. Large-Scale Security Analysis of Hardware Wallets. Online. In Coppens, Bart and Volckaert, Bruno and Naessens, Vincent and De Sutter, Bjorn. Lecture Notes in Computer Science, LNCS 15995. 1st edition. Cham: Springer, Cham, 2025, s. 360-377. ISBN 978-3-032-00632-5. Dostupné z: https://doi.org/10.1007/978-3-032-00633-2_21.Podrobněji: https://is.muni.cz/publication/2511977/cs
-
Protected ECC Implementations C - Kapitola resp. kapitoly v odborné knizeCHMIELEWSKI, Lukasz Michal a Louiza PAPACHRISTODOULOU. Protected ECC Implementations. Online. In Emmanuel Prouff, Guénaël Renault, Matthieu Rivain, Colin O'Flynn. Embedded Cryptography 2. Hoboken, NJ, USA: John Wiley & Sons, Inc, 2025, s. 225-248. Embedded Cryptography vol. 2. ISBN 978-1-394-35189-3. Dostupné z: https://doi.org/10.1002/9781394351909.ch10.Podrobněji: https://is.muni.cz/publication/2513798/cs
-
Revisiting the analysis of references among Common Criteria certified products J - Článek v odborném periodikuJANOVSKÝ, Adam; Lukasz Michal CHMIELEWSKI; Petr ŠVENDA; Ján JANČÁR a Václav MATYÁŠ. Revisiting the analysis of references among Common Criteria certified products. Computers & Security. 2025, roč. 152, č. 104362, s. 1-10. ISSN 0167-4048. Dostupné z: https://doi.org/10.1016/j.cose.2025.104362.Podrobněji: https://is.muni.cz/publication/2474337/cs
-
Breaking DPA-protected Kyber via the pair-pointwise multiplication D - Stať ve sborníkuBOCK, Estuardo Alpirez; Gustavo BANEGAS; Chris BRZUSKA; Lukasz Michal CHMIELEWSKI; Kirthivaasan PUNIAMURTHY a Milan ŠORF. Breaking DPA-protected Kyber via the pair-pointwise multiplication. In 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024. Abu Dhabi: Springer, 2024, s. 101-130. ISBN 978-3-031-54772-0. Dostupné z: https://doi.org/10.1007/978-3-031-54773-7_5.Podrobněji: https://is.muni.cz/publication/2369500/cs
-
CNN architecture extraction on edge GPU D - Stať ve sborníkuHORVATH, Peter; Lukasz Michal CHMIELEWSKI; Lejla BATINA; Leo WEISSBART a Yuval YAROM. CNN architecture extraction on edge GPU. In Artificial Intelligence in Hardware Security (AIHWS) Workshop (Satellite Workshops held in parallel with the 22nd International Conference on Applied Cryptography and Network Security, ACNS 2024). Abu Dhabi: Springer, 2024, s. 158-175. ISBN 978-3-031-61485-9. Dostupné z: https://doi.org/10.1007/978-3-031-61486-6_10.Podrobněji: https://is.muni.cz/publication/2369717/cs
-
Chain of Trust: Unraveling References Among Common Criteria Certified Products D - Stať ve sborníkuJANOVSKÝ, Adam; Lukasz Michal CHMIELEWSKI; Petr ŠVENDA; Ján JANČÁR a Václav MATYÁŠ. Chain of Trust: Unraveling References Among Common Criteria Certified Products. Online. In Nikolaos Pitropakis, Sokratis Katsikas, Steven Furnell, Konstantinos Markantonakis. ICT Systems Security and Privacy Protection. SEC 2024. IFIP Advances in Information and Communication Technology. volume 710. Cham: Springer Nature Switzerland, 2024, s. 191-205. ISBN 978-3-031-65174-8. Dostupné z: https://doi.org/10.1007/978-3-031-65175-5_14.Podrobněji: https://is.muni.cz/publication/2420157/cs
-
pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis D - Stať ve sborníkuJANČÁR, Ján; Vojtěch SUCHÁNEK; Petr ŠVENDA; Vladimír SEDLÁČEK a Lukasz Michal CHMIELEWSKI. pyecsca: Reverse engineering black-box elliptic curve cryptography via side-channel analysis. Online. In IACR Transactions on Cryptographic Hardware and Embedded Systems. Německo: Ruhr-University of Bochum, 2024, s. 355-381. ISSN 2569-2925. Dostupné z: https://doi.org/10.46586/tches.v2024.i4.355-381.Podrobněji: https://is.muni.cz/publication/2411818/cs
-
sec-certs: Examining the security certification practice for better vulnerability mitigation J - Článek v odborném periodikuJANOVSKÝ, Adam; Ján JANČÁR; Petr ŠVENDA; Lukasz Michal CHMIELEWSKI; Jiří MICHALÍK a Václav MATYÁŠ. sec-certs: Examining the security certification practice for better vulnerability mitigation. Computers & Security. 2024, roč. 143, č. 103895, s. 1-13. ISSN 0167-4048. Dostupné z: https://doi.org/10.1016/j.cose.2024.103895.Podrobněji: https://is.muni.cz/publication/2418937/cs
-
SoK: SCA-secure ECC in software – mission impossible? D - Stať ve sborníkuBATINA, Lejla; Lukasz Michal CHMIELEWSKI; Björn HAASE; Niels SAMWEL a Peter SCHWABE. SoK: SCA-secure ECC in software – mission impossible?. Online. In Diego F. Aranha and Marcel Medwed. L. BATINA, B. HAASE,, Radboud University & EH a Radboud University & MPI N. SAMWEL, P. SCHWABE. IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2023, Issue 1. Germany: Ruhr-University of Bochum, 2023, s. 557-589. ISSN 2569-2925. Dostupné z: https://doi.org/10.46586/tches.v2023.i1.557-589.Podrobněji: https://is.muni.cz/publication/2315177/cs
-
Protecting the Most Significant Bits in Scalar Multiplication Algorithms D - Stať ve sborníkuBOCK, Estuardo Alpirez; Lukasz Michal CHMIELEWSKI a Konstantina MITELOUDI. Protecting the Most Significant Bits in Scalar Multiplication Algorithms. In 12th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2022. Jaipur: Springer, 2022, s. 118-137. ISBN 978-3-031-22828-5. Dostupné z: https://doi.org/10.1007/978-3-031-22829-2_7.Podrobněji: https://is.muni.cz/publication/2273651/cs