BibTeX records: Niels Samwel

download as .bib file

@inproceedings{DBLP:conf/ndss/LiuSW0LBL21,
  author    = {Zhuoran Liu and
               Niels Samwel and
               Leo Weissbart and
               Zhengyu Zhao and
               Dirk Lauret and
               Lejla Batina and
               Martha A. Larson},
  title     = {Screen Gleaning: {A} Screen Reading {TEMPEST} Attack on Mobile Devices
               Exploiting an Electromagnetic Side Channel},
  booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS}
               2021, virtually, February 21-25, 2021},
  publisher = {The Internet Society},
  year      = {2021},
  url       = {https://www.ndss-symposium.org/ndss-paper/screen-gleaning-a-screen-reading-tempest-attack-on-mobile-devices-exploiting-an-electromagnetic-side-channel/},
  timestamp = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/LiuSW0LBL21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SheltonSB00Y21,
  author    = {Madura A. Shelton and
               Niels Samwel and
               Lejla Batina and
               Francesco Regazzoni and
               Markus Wagner and
               Yuval Yarom},
  title     = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
               Ciphers},
  booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS}
               2021, virtually, February 21-25, 2021},
  publisher = {The Internet Society},
  year      = {2021},
  url       = {https://www.ndss-symposium.org/ndss-paper/rosita-towards-automatic-elimination-of-power-analysis-leakage-in-ciphers/},
  timestamp = {Thu, 17 Jun 2021 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/SheltonSB00Y21.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/RoelofsSBD20,
  author    = {Niels Roelofs and
               Niels Samwel and
               Lejla Batina and
               Joan Daemen},
  editor    = {Abderrahmane Nitaj and
               Amr M. Youssef},
  title     = {Online Template Attack on {ECDSA:} - Extracting Keys via the Other
               Side},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2020 - 12th International Conference
               on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {12174},
  pages     = {323--336},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-51938-4\_16},
  doi       = {10.1007/978-3-030-51938-4\_16},
  timestamp = {Tue, 07 Jul 2020 13:21:59 +0200},
  biburl    = {https://dblp.org/rec/conf/africacrypt/RoelofsSBD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SimonBDGMP0S20,
  author    = {Thierry Simon and
               Lejla Batina and
               Joan Daemen and
               Vincent Grosso and
               Pedro Maat Costa Massolino and
               Kostas Papagiannopoulos and
               Francesco Regazzoni and
               Niels Samwel},
  editor    = {Anne Canteaut and
               Yuval Ishai},
  title     = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {12105},
  pages     = {581--611},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-45721-1\_21},
  doi       = {10.1007/978-3-030-45721-1\_21},
  timestamp = {Mon, 04 May 2020 14:27:11 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/SimonBDGMP0S20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-09877,
  author    = {Zhuoran Liu and
               Niels Samwel and
               Leo Weissbart and
               Zhengyu Zhao and
               Dirk Lauret and
               Lejla Batina and
               Martha A. Larson},
  title     = {Screen Gleaning: {A} Screen Reading {TEMPEST} Attack on Mobile Devices
               Exploiting an Electromagnetic Side Channel},
  journal   = {CoRR},
  volume    = {abs/2011.09877},
  year      = {2020},
  url       = {https://arxiv.org/abs/2011.09877},
  archivePrefix = {arXiv},
  eprint    = {2011.09877},
  timestamp = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2011-09877.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimonBDGMPRS20,
  author    = {Thierry Simon and
               Lejla Batina and
               Joan Daemen and
               Vincent Grosso and
               Pedro Maat Costa Massolino and
               Kostas Papagiannopoulos and
               Francesco Regazzoni and
               Niels Samwel},
  title     = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2020},
  pages     = {425},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/425},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-05183,
  author    = {Madura A. Shelton and
               Niels Samwel and
               Lejla Batina and
               Francesco Regazzoni and
               Markus Wagner and
               Yuval Yarom},
  title     = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
               Ciphers},
  journal   = {CoRR},
  volume    = {abs/1912.05183},
  year      = {2019},
  url       = {http://arxiv.org/abs/1912.05183},
  archivePrefix = {arXiv},
  eprint    = {1912.05183},
  timestamp = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1912-05183.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SheltonSBR0Y19,
  author    = {Madura A. Shelton and
               Niels Samwel and
               Lejla Batina and
               Francesco Regazzoni and
               Markus Wagner and
               Yuval Yarom},
  title     = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in
               Ciphers},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1445},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1445},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SheltonSBR0Y19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SamwelB18,
  author    = {Niels Samwel and
               Lejla Batina},
  editor    = {Antoine Joux and
               Abderrahmane Nitaj and
               Tajjeeddine Rachidi},
  title     = {Practical Fault Injection on Deterministic Signatures: The Case of
               EdDSA},
  booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
               on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10831},
  pages     = {306--321},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-89339-6\_17},
  doi       = {10.1007/978-3-319-89339-6\_17},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/africacrypt/SamwelB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SamwelBBDS18,
  author    = {Niels Samwel and
               Lejla Batina and
               Guido Bertoni and
               Joan Daemen and
               Ruggero Susella},
  editor    = {Nigel P. Smart},
  title     = {Breaking Ed25519 in WolfSSL},
  booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
               the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10808},
  pages     = {1--20},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-76953-0\_1},
  doi       = {10.1007/978-3-319-76953-0\_1},
  timestamp = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ctrsa/SamwelBBDS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/MaldiniSPB18,
  author    = {Antun Maldini and
               Niels Samwel and
               Stjepan Picek and
               Lejla Batina},
  title     = {Genetic Algorithm-Based Electromagnetic Fault Injection},
  booktitle = {2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
               2018, Amsterdam, The Netherlands, September 13, 2018},
  pages     = {35--42},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://doi.org/10.1109/FDTC.2018.00014},
  doi       = {10.1109/FDTC.2018.00014},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/fdtc/MaldiniSPB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SimonBDGMPRS18,
  author    = {Thierry Simon and
               Lejla Batina and
               Joan Daemen and
               Vincent Grosso and
               Pedro Maat Costa Massolino and
               Kostas Papagiannopoulos and
               Francesco Regazzoni and
               Niels Samwel},
  title     = {Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {729},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/729},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SimonBDGMPRS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cf/SamwelD17,
  author    = {Niels Samwel and
               Joan Daemen},
  title     = {{DPA} on hardware implementations of Ascon and Keyak},
  booktitle = {Proceedings of the Computing Frontiers Conference, CF'17, Siena, Italy,
               May 15-17, 2017},
  pages     = {415--424},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3075564.3079067},
  doi       = {10.1145/3075564.3079067},
  timestamp = {Tue, 06 Nov 2018 11:07:32 +0100},
  biburl    = {https://dblp.org/rec/conf/cf/SamwelD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SamwelBBDS17,
  author    = {Niels Samwel and
               Lejla Batina and
               Guido Bertoni and
               Joan Daemen and
               Ruggero Susella},
  title     = {Breaking Ed25519 in WolfSSL},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {985},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/985},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/SamwelBBDS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics