Stjepan Picek

Orcid: 0000-0001-7509-4337

Affiliations:
  • Delft University of Technology, Intelligent Systems, The Netherlands
  • Radboud University, Digital Security Group, Nijmegen, The Netherlands


According to our database1, Stjepan Picek authored at least 244 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis.
IEEE Des. Test, 2024

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
CoRR, 2024

LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study.
CoRR, 2024

A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions in Odd Sizes.
CoRR, 2024

The SpongeNet Attack: Sponge Weight Poisoning of Deep Neural Networks.
CoRR, 2024

Time-Distributed Backdoor Attacks on Federated Spiking Learning.
CoRR, 2024

Assessing the Ability of Genetic Programming for Feature Selection in Constructing Dispatching Rules for Unrelated Machine Environments.
Algorithms, 2024

A New Angle: On Evolving Rotation Symmetric Boolean Functions.
Proceedings of the Applications of Evolutionary Computation - 27th European Conference, 2024

Look into the Mirror: Evolving Self-dual Bent Boolean Functions.
Proceedings of the Genetic Programming - 27th European Conference, 2024

Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024

PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market.
Proceedings of the Applied Reconfigurable Computing. Architectures, Tools, and Applications, 2024

2023
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions.
Cryptogr. Commun., December, 2023

SoK: Deep Learning-based Physical Side-channel Analysis.
ACM Comput. Surv., November, 2023

No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis.
J. Cryptogr. Eng., September, 2023

Backdoor Pony: Evaluating backdoor attacks and defenses in different domains.
SoftwareX, May, 2023

Label Correlation in Deep Learning-Based Side-Channel Analysis.
IEEE Trans. Inf. Forensics Secur., 2023

(Adversarial) Electromagnetic Disturbance in the Industry.
IEEE Trans. Computers, 2023

OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion.
IACR Cryptol. ePrint Arch., 2023

An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation.
IACR Cryptol. ePrint Arch., 2023

Not so Difficult in the End: Breaking the ASCADv2 Dataset.
IACR Cryptol. ePrint Arch., 2023

Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext.
IACR Cryptol. ePrint Arch., 2023

Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller.
IACR Cryptol. ePrint Arch., 2023

Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression.
IACR Cryptol. ePrint Arch., 2023

Order vs. Chaos: A Language Model Approach for Side-channel Attacks.
IACR Cryptol. ePrint Arch., 2023

Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage.
IACR Cryptol. ePrint Arch., 2023

It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2023

Bent functions in the partial spread class generated by linear recurring sequences.
Des. Codes Cryptogr., 2023

MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness.
CoRR, 2023

Dr. Jekyll and Mr. Hyde: Two Faces of LLMs.
CoRR, 2023

Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data.
CoRR, 2023

Momentum Gradient-based Untargeted Attack on Hypergraph Neural Networks.
CoRR, 2023

Invisible Threats: Backdoor Attack in OCR Systems.
CoRR, 2023

BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks.
CoRR, 2023

Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data.
CoRR, 2023

A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification.
CoRR, 2023

Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks.
CoRR, 2023

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
Adv. Math. Commun., 2023

On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight.
IEEE Access, 2023

NeuroSCA: Evolving Activation Functions for Side-Channel Analysis.
IEEE Access, 2023

On Feasibility of Server-side Backdoor Attacks on Split Learning.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

DARWIN: Survival of the Fittest Fuzzing Mutators.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Rethinking the Trigger-injecting Position in Graph Backdoor Attack.
Proceedings of the International Joint Conference on Neural Networks, 2023

Going in Style: Audio Backdoors Through Stylistic Transformations.
Proceedings of the IEEE International Conference on Acoustics, 2023

Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

Modeling Strong Physically Unclonable Functions with Metaheuristics.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning.
Proceedings of the 33rd International Conference on Field-Programmable Logic and Applications, 2023

Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications.
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023

On the Evolution of Boomerang Uniformity in Cryptographic S-boxes.
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023

Evolutionary Strategies for the Design of Binary Linear Codes.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2023

Watermarking Graph Neural Networks based on Backdoor Attacks.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Boosting Adversarial Robustness by Adversarial Pre-training.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Backdoor Attack on Extreme Learning Machines.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Turning Privacy-preserving Mechanisms against Federated Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis.
Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security, 2023

2022
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412).
Dagstuhl Reports, October, 2022

The Best of Two Worlds: Deep Learning-assisted Template Attack.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Guest Editorial: Trustworthy AI.
ACM J. Emerg. Technol. Comput. Syst., 2022

On the feasibility of crawling-based attacks against recommender systems.
J. Comput. Secur., 2022

AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022

To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA.
IACR Cryptol. ePrint Arch., 2022

I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022

Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions.
IACR Cryptol. ePrint Arch., 2022

The More You Know: Improving Laser Fault Injection with Prior Knowledge.
IACR Cryptol. ePrint Arch., 2022

Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2022

Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher.
IACR Cryptol. ePrint Arch., 2022

SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels.
IEEE Des. Test, 2022

On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models.
CoRR, 2022

BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering.
CoRR, 2022

Client-Wise Targeted Backdoor in Federated Learning.
CoRR, 2022

Modeling Strong Physically Unclonable Functions with Metaheuristics.
CoRR, 2022

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
CoRR, 2022

Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers.
Proceedings of the WiseML@WiSec 2022: Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning, 2022

Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand.
Proceedings of the 31st USENIX Security Symposium, 2022

Evolutionary computation and machine learning in security.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

On generalizing the power function exponent constructions with genetic programming.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

Evolving constructions for balanced, highly nonlinear boolean functions.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9, 2022

On the Difficulty of Evolving Permutation Codes.
Proceedings of the Applications of Evolutionary Computation - 25th European Conference, 2022

Evolutionary Construction of Perfectly Balanced Boolean Functions.
Proceedings of the IEEE Congress on Evolutionary Computation, 2022

Poster: Clean-label Backdoor Attack on Graph Neural Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Label-Only Membership Inference Attack against Node-Level Graph Neural Networks.
Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, 2022

Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Dynamic Backdoors with Global Average Pooling.
Proceedings of the 4th IEEE International Conference on Artificial Intelligence Circuits and Systems, 2022

More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Keep it Unsupervised: Horizontal Attacks Meet Deep Learning.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

On the Evaluation of Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

Deep Learning-based Side-channel Analysis against AES Inner Rounds.
IACR Cryptol. ePrint Arch., 2021

Reinforcement Learning-based Design of Side-channel Countermeasures.
IACR Cryptol. ePrint Arch., 2021

The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA.
IACR Cryptol. ePrint Arch., 2021

AISY - Deep Learning-based Framework for Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA.
IACR Cryptol. ePrint Arch., 2021

Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices.
IACR Cryptol. ePrint Arch., 2021

A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber.
IACR Cryptol. ePrint Arch., 2021

NeuroSCA: Evolving Activation Functions for Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2021

A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage.
IACR Cryptol. ePrint Arch., 2021

Evolutionary algorithms for designing reversible cellular automata.
Genet. Program. Evolvable Mach., 2021

SoK: On the Security & Privacy in Federated Learning.
CoRR, 2021

Watermarking Graph Neural Networks based on Backdoor Attacks.
CoRR, 2021

Toward more efficient heuristic construction of Boolean functions.
Appl. Soft Comput., 2021

A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System.
IEEE Access, 2021

Explainability-based Backdoor Attacks Against Graph Neural Networks.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility.
Proceedings of the Reproducible Research in Pattern Recognition, 2021

On the genotype compression and expansion for evolutionary algorithms in the continuous domain.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

CoInGP: convolutional inpainting with genetic programming.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Evolutionary algorithms-assisted construction of cryptographic boolean functions.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

On the Importance of Initial Solutions Selection in Fault Injection.
Proceedings of the 18th Workshop on Fault Detection and Tolerance in Cryptography, 2021

Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2021

Profiled Side-Channel Analysis in the Efficient Attacker Framework.
Proceedings of the Smart Card Research and Advanced Applications, 2021

It Started with Templates: The Future of Profiling in Side-Channel Analysis.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Lightweight Ciphers and Their Side-Channel Resilience.
IEEE Trans. Computers, 2020

Systematic Side-Channel Analysis of Curve25519 with Machine Learning.
J. Hardw. Syst. Secur., 2020

Everything is Connected: From Model Learnability to Guessing Entropy.
IACR Cryptol. ePrint Arch., 2020

I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2020

On the Influence of Optimizers in Deep Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2020

Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis.
IACR Cryptol. ePrint Arch., 2020

Bent Functions from Cellular Automata.
IACR Cryptol. ePrint Arch., 2020

The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions.
Cryptologia, 2020

CoInGP: Convolutional Inpainting with Genetic Programming.
CoRR, 2020

On the feasibility of using evolvable hardware for hardware Trojan detection and prevention.
Appl. Soft Comput., 2020

Fitness Landscape Analysis of Dimensionally-Aware Genetic Programming Featuring Feynman Equations.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020

A Search for Additional Structure: The Case of Cryptographic S-boxes.
Proceedings of the Parallel Problem Solving from Nature - PPSN XVI, 2020

Evolutionary computation and machine learning in cryptology.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

Towards an evolutionary-based approach for natural language processing.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

One property to rule them all?: on the limits of trade-offs for S-boxes.
Proceedings of the GECCO '20: Genetic and Evolutionary Computation Conference, 2020

What Is Your MOVE: Modeling Adversarial Network Environments.
Proceedings of the Applications of Evolutionary Computation - 23rd European Conference, 2020

An Evolutionary View on Reversible Shift-Invariant Transformations.
Proceedings of the Genetic Programming - 23rd European Conference, 2020

Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems.
Proceedings of the Computer Security - ESORICS 2020, 2020

Learning From A Big Brother - Mimicking Neural Networks in Profiled Side-channel Analysis.
Proceedings of the 57th ACM/IEEE Design Automation Conference, 2020

A Fast Characterization Method for Semi-invasive Fault Injection Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
A Systematic Evaluation of Profiling Through Focused Feature Selection.
IEEE Trans. Very Large Scale Integr. Syst., 2019

The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

A Fast Characterization Method for Optical Fault Injection.
IACR Cryptol. ePrint Arch., 2019

On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019

One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA.
IACR Cryptol. ePrint Arch., 2019

Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Bias-variance Decomposition in Machine Learning-based Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Profiling Side-channel Analysis in the Restricted Attacker Framework.
IACR Cryptol. ePrint Arch., 2019

Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2019

Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019

Cellular automata based S-boxes.
Cryptogr. Commun., 2019

CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel.
Proceedings of the 28th USENIX Security Symposium, 2019

Challenges in Deep Learning-Based Profiled Side-Channel Analysis.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

C<sup>3</sup>PO: cipher construction with cartesian genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

On the design of S-box constructions with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference Companion, 2019

A characterisation of S-box fitness landscapes in cryptography.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019

Evolutionary Algorithms for the Design of Quantum Protocols.
Proceedings of the Applications of Evolutionary Computation, 2019

Hyper-bent Boolean Functions and Evolutionary Algorithms.
Proceedings of the Genetic Programming - 22nd European Conference, 2019

Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules.
IACR Trans. Symmetric Cryptol., 2018

On the Performance of Deep Learning for Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2018

When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis.
IACR Cryptol. ePrint Arch., 2018

Higher Order Side-Channel Attacks Resilient S-boxes.
IACR Cryptol. ePrint Arch., 2018

Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules.
IACR Cryptol. ePrint Arch., 2018

CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information.
IACR Cryptol. ePrint Arch., 2018

Finding short and implementation-friendly addition chains with evolutionary algorithms.
J. Heuristics, 2018

Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018

The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms.
Proceedings of the Theory and Practice of Natural Computing - 7th International Conference, 2018

On the Performance of Convolutional Neural Networks for Side-Channel Analysis.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018


Evolutionary Search of Binary Orthogonal Arrays.
Proceedings of the Parallel Problem Solving from Nature - PPSN XV, 2018

Genetic Algorithm-Based Electromagnetic Fault Injection.
Proceedings of the 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2018

Higher order side-channel attack resilient S-boxes.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

Evolving Bent Quaternary Functions.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

A Search for Differentially-6 Uniform (n, n-2) Functions.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

Improving Side-Channel Analysis Through Semi-supervised Learning.
Proceedings of the Smart Card Research and Advanced Applications, 2018

On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers.
Proceedings of the 2018 IEEE Asia Pacific Conference on Circuits and Systems, 2018

2017
Template attack versus Bayes classifier.
J. Cryptogr. Eng., 2017

Profiled SCA with a New Twist: Semi-supervised Learning.
IACR Cryptol. ePrint Arch., 2017

The secrets of profiling for side-channel analysis: feature selection matters.
IACR Cryptol. ePrint Arch., 2017

Template Attack vs Bayes Classifier.
IACR Cryptol. ePrint Arch., 2017

Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?
IACR Cryptol. ePrint Arch., 2017

Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties.
Eng. Appl. Artif. Intell., 2017

Automatic Feature Construction for Network Intrusion Detection.
Proceedings of the Simulated Evolution and Learning - 11th International Conference, 2017

Side-channel analysis and machine learning: A practical perspective.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

One-Class Classification of Low Volume DoS Attacks with Genetic Programming.
Proceedings of the Genetic Programming Theory and Practice XV, 2017

Evolving S-boxes based on cellular automata with genetic programming.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

CryptoBench: benchmarking evolutionary algorithms with cryptographic problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Evolutionary computation and cryptology.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Evolutionary algorithms for the design of orthogonal latin squares based on cellular automata.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

Amplitude-oriented mixed-type CGP classification.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

On the mutual information as a fitness landscape measure.
Proceedings of the Genetic and Evolutionary Computation Conference, 2017

On the Construction of Side-Channel Attack Resilient S-boxes.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

Design of S-boxes Defined with Cellular Automata Rules.
Proceedings of the Computing Frontiers Conference, 2017

On the evolution of bent (n, m) functions.
Proceedings of the 2017 IEEE Congress on Evolutionary Computation, 2017

If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
A New Cost Function for Evolution of S-Boxes.
Evol. Comput., 2016

Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.
Evol. Comput., 2016

Cryptographic Boolean functions: One output, many design criteria.
Appl. Soft Comput., 2016

Applications of Soft Computing in Cryptology.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

A Search Strategy to Optimize the Affine Variant Properties of S-Boxes.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Evolving Cryptographic Pseudorandom Number Generators.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIV, 2016


Evolving Algebraic Constructions for Designing Bent Boolean Functions.
Proceedings of the 2016 on Genetic and Evolutionary Computation Conference, Denver, CO, USA, July 20, 2016

Evolutionary Algorithms for Finding Short Addition Chains: Going the Distance.
Proceedings of the Evolutionary Computation in Combinatorial Optimization, 2016

Maximal nonlinearity in balanced boolean functions with even number of inputs, revisited.
Proceedings of the IEEE Congress on Evolutionary Computation, 2016

PRNGs for Masking Applications and Their Mapping to Evolvable Hardware.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Applications of Evolutionary Computation to Cryptology ; Primjene evolucijskog računarstva u kriptologiji.
PhD thesis, 2015

Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight.
Proceedings of the Theory and Practice of Natural Computing, 2015

Modified Transparency Order Property: Solution or Just Another Attempt.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Improving the android smartphone security against various malware threats.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Challenges in designing trustworthy cryptographic co-processors.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Improving DPA resistance of S-boxes: How far can we go?
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015

Fighting the Symmetries: The Structure of Cryptographic Boolean Function Spaces.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective.
Proceedings of the Genetic and Evolutionary Computation Conference, 2015

Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015

Evolutionary Methods for the Construction of Cryptographic Boolean Functions.
Proceedings of the Genetic Programming - 18th European Conference, 2015

Fault Injection with a New Flavor: Memetic Algorithms Make a Difference.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2015

2014
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?
IACR Cryptol. ePrint Arch., 2014

S-box, SET, Match: A Toolbox for S-box Analysis.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014

Evolving DPA-Resistant Boolean Functions.
Proceedings of the Parallel Problem Solving from Nature - PPSN XIII, 2014

Evolving genetic algorithms for fault injection attacks.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

Homomorphic encryption in the cloud.
Proceedings of the 37th International Convention on Information and Communication Technology, 2014

Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

Optimality and beyond: The case of 4×4 S-boxes.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box.
Proceedings of the First Workshop on Cryptography and Security in Computing Systems, 2014

From fitness landscape to crossover operator choice.
Proceedings of the Genetic and Evolutionary Computation Conference, 2014

2013
Evolving cryptographically sound boolean functions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2013

On the recombination operator in the real-coded genetic algorithms.
Proceedings of the IEEE Congress on Evolutionary Computation, 2013

Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
On the analysis of experimental results in evolutionary computation.
Proceedings of the 2012 Proceedings of the 35th International Convention, 2012

Influence of the crossover operator in the performance of the hybrid Taguchi GA.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
On evolutionary computation methods in cryptography.
Proceedings of the MIPRO, 2011

Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation.
Proceedings of the Bio-Inspired Computing and Applications, 2011


  Loading...