BibTeX records: Niels Samwel

download as .bib file

@article{DBLP:journals/corr/abs-1912-05183,
  author    = {Madura A. Shelton and
               Niels Samwel and
               Lejla Batina and
               Francesco Regazzoni and
               Markus Wagner and
               Yuval Yarom},
  title     = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
               Ciphers},
  journal   = {CoRR},
  volume    = {abs/1912.05183},
  year      = {2019},
  url       = {http://arxiv.org/abs/1912.05183},
  archivePrefix = {arXiv},
  eprint    = {1912.05183},
  timestamp = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1912-05183.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SheltonSBR0Y19,
  author    = {Madura A. Shelton and
               Niels Samwel and
               Lejla Batina and
               Francesco Regazzoni and
               Markus Wagner and
               Yuval Yarom},
  title     = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
               Ciphers},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2019},
  pages     = {1445},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1445},
  timestamp = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/iacr/SheltonSBR0Y19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SamwelB18,
  author    = {Niels Samwel and
               Lejla Batina},
  editor    = {Antoine Joux and
               Abderrahmane Nitaj and
               Tajjeeddine Rachidi},
  title     = {Practical Fault Injection on Deterministic Signatures: The Case of
               EdDSA},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10831},
  pages     = {306--321},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-89339-6\_17},
  doi       = {10.1007/978-3-319-89339-6\_17},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/africacrypt/SamwelB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18,
  author    = {Niels Samwel and
               Lejla Batina and
               Guido Bertoni and
               Joan Daemen and
               Ruggero Susella},
  editor    = {Nigel P. Smart},
  title     = {Breaking Ed25519 in WolfSSL},
  booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
               the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10808},
  pages     = {1--20},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76953-0\_1},
  doi       = {10.1007/978-3-319-76953-0\_1},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MaldiniSPB18,
  author    = {Antun Maldini and
               Niels Samwel and
               Stjepan Picek and
               Lejla Batina},
  title     = {Genetic Algorithm-Based Electromagnetic Fault Injection},
  booktitle = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2018, Amsterdam, The Netherlands, September 13, 2018},
  pages     = {35--42},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://doi.org/10.1109/FDTC.2018.00014},
  doi       = {10.1109/FDTC.2018.00014},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/fdtc/MaldiniSPB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimonBDGMPRS18,
  author    = {Thierry Simon and
               Lejla Batina and
               Joan Daemen and
               Vincent Grosso and
               Pedro Maat Costa Massolino and
               Kostas Papagiannopoulos and
               Francesco Regazzoni and
               Niels Samwel},
  title     = {Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {729},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/729},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/SamwelD17,
  author    = {Niels Samwel and
               Joan Daemen},
  title     = {{DPA} on hardware implementations of Ascon and Keyak},
  booktitle = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy,
               May 15-17, 2017},
  pages     = {415--424},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3075564.3079067},
  doi       = {10.1145/3075564.3079067},
  timestamp = {Tue, 06 Nov 2018 11:07:32 +0100},
  biburl    = {https://dblp.org/rec/conf/cf/SamwelD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamwelBBDS17,
  author    = {Niels Samwel and
               Lejla Batina and
               Guido Bertoni and
               Joan Daemen and
               Ruggero Susella},
  title     = {Breaking Ed25519 in WolfSSL},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {985},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/985},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics