Stjepan Picek

According to our database1, Stjepan Picek authored at least 100 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

A Fast Characterization Method for Optical Fault Injection.
IACR Cryptology ePrint Archive, 2019

One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA.
IACR Cryptology ePrint Archive, 2019

Bias-variance Decomposition in Machine Learning-based Side-channel Analysis.
IACR Cryptology ePrint Archive, 2019

Profiling Side-channel Analysis in the Restricted Attacker Framework.
IACR Cryptology ePrint Archive, 2019

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
IACR Cryptology ePrint Archive, 2019

Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019

The Fifth International Students' Olympiad in Cryptography - NSUCRYPTO: problems and their solutions.
CoRR, 2019

A characterisation of S-box fitness landscapes in cryptography.
CoRR, 2019

Cellular automata based S-boxes.
Cryptography and Communications, 2019

CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel.
Proceedings of the 28th USENIX Security Symposium, 2019

Challenges in Deep Learning-Based Profiled Side-Channel Analysis.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

C3PO: cipher construction with cartesian genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

On the design of S-box constructions with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

Evolutionary Algorithms for the Design of Quantum Protocols.
Proceedings of the Applications of Evolutionary Computation, 2019

Hyper-bent Boolean Functions and Evolutionary Algorithms.
Proceedings of the Genetic Programming - 22nd European Conference, 2019

Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.
IACR Trans. Symmetric Cryptol., 2018

On the Performance of Deep Learning for Side-channel Analysis.
IACR Cryptology ePrint Archive, 2018

When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis.
IACR Cryptology ePrint Archive, 2018

Higher Order Side-Channel Attacks Resilient S-boxes.
IACR Cryptology ePrint Archive, 2018

Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules.
IACR Cryptology ePrint Archive, 2018

Finding short and implementation-friendly addition chains with evolutionary algorithms.
J. Heuristics, 2018

CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information.
CoRR, 2018

Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018

The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms.
Proceedings of the Theory and Practice of Natural Computing - 7th International Conference, 2018

On the Performance of Convolutional Neural Networks for Side-Channel Analysis.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018


Evolutionary Search of Binary Orthogonal Arrays.
Proceedings of the Parallel Problem Solving from Nature - PPSN XV, 2018

Genetic Algorithm-Based Electromagnetic Fault Injection.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018

Higher order side-channel attack resilient S-boxes.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

Evolving Bent Quaternary Functions.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

A Search for Differentially-6 Uniform (n, n-2) Functions.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

Improving Side-Channel Analysis Through Semi-supervised Learning.
Proceedings of the Smart Card Research and Advanced Applications, 2018

On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Template attack versus Bayes classifier.
J. Cryptographic Engineering, 2017

Profiled SCA with a New Twist: Semi-supervised Learning.
IACR Cryptology ePrint Archive, 2017

The secrets of profiling for side-channel analysis: feature selection matters.
IACR Cryptology ePrint Archive, 2017

Template Attack vs Bayes Classifier.
IACR Cryptology ePrint Archive, 2017

Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
IACR Cryptology ePrint Archive, 2017

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
IACR Cryptology ePrint Archive, 2017

Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties.
Eng. Appl. of AI, 2017

Automatic Feature Construction for Network Intrusion Detection.
Proceedings of the Simulated Evolution and Learning - 11th International Conference, 2017

Side-channel analysis and machine learning: A practical perspective.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

One-Class Classification of Low Volume DoS Attacks with Genetic Programming.
Proceedings of the Genetic Programming Theory and Practice XV, 2017

Evolving S-boxes based on cellular automata with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

CryptoBench: benchmarking evolutionary algorithms with cryptographic problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Evolutionary computation and cryptology.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Evolutionary algorithms for the design of orthogonal latin squares based on cellular automata.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Amplitude-oriented mixed-type CGP classification.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

On the mutual information as a fitness landscape measure.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

On the Construction of Side-Channel Attack Resilient S-boxes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Design of S-boxes Defined with Cellular Automata Rules.
Proceedings of the Computing Frontiers Conference, 2017

On the evolution of bent (n, m) functions.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
A New Cost Function for Evolution of S-Boxes.
Evolutionary Computation, 2016

Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.
Evolutionary Computation, 2016

Cryptographic Boolean functions: One output, many design criteria.
Appl. Soft Comput., 2016

Applications of Soft Computing in Cryptology.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Search Strategy to Optimize the Affine Variant Properties of S-Boxes.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Evolving Cryptographic Pseudorandom Number Generators.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016


Evolving Algebraic Constructions for Designing Bent Boolean Functions.
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20, 2016

Evolutionary Algorithms for Finding Short Addition Chains: Going the Distance.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2016

Maximal nonlinearity in balanced boolean functions with even number of inputs, revisited.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

PRNGs for Masking Applications and Their Mapping to Evolvable Hardware.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight.
Proceedings of the Theory and Practice of Natural Computing, 2015

Modified Transparency Order Property: Solution or Just Another Attempt.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Improving the android smartphone security against various malware threats.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Challenges in designing trustworthy cryptographic co-processors.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Improving DPA resistance of S-boxes: How far can we go?
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Fighting the Symmetries: The Structure of Cryptographic Boolean Function Spaces.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015

Evolutionary Methods for the Construction of Cryptographic Boolean Functions.
Proceedings of the Genetic Programming - 18th European Conference, 2015

Fault Injection with a New Flavor: Memetic Algorithms Make a Difference.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
IACR Cryptology ePrint Archive, 2014

S-box, SET, Match: A Toolbox for S-box Analysis.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014

Evolving DPA-Resistant Boolean Functions.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014

Evolving genetic algorithms for fault injection attacks.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

Homomorphic encryption in the cloud.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Optimality and beyond: The case of 4×4 S-boxes.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

From fitness landscape to crossover operator choice.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

2013
Evolving cryptographically sound boolean functions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

On the recombination operator in the real-coded genetic algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
On the analysis of experimental results in evolutionary computation.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012

Influence of the crossover operator in the performance of the hybrid Taguchi GA.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
On evolutionary computation methods in cryptography.
Proceedings of the MIPRO, 2011

Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation.
Proceedings of the Bio-Inspired Computing and Applications, 2011


  Loading...