Stjepan Picek
Stjepan Picek
Delft University of Technology
Potvrđena adresa e-pošte na computer.org
Naslov
Citirano
Citirano
Godina
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
802019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
792019
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
International Conference on Security, Privacy, and Applied Cryptography …, 2018
60*2018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
602017
{CSI}{NN}: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel
L Batina, S Bhasin, D Jap, S Picek
28th {USENIX} Security Symposium ({USENIX} Security 19), 515-532, 2019
56*2019
Cryptographic Boolean functions: One output, many design criteria
S Picek, D Jakobovic, JF Miller, L Batina, M Cupic
Applied Soft Computing 40, 635-653, 2016
462016
Comparison of a crossover operator in binary-coded genetic algorithms
S Picek, M Golub
WSEAS transactions on computers 9 (9), 1064-1073, 2010
402010
Evaluation of crossover operator performance in genetic algorithms with binary representation
S Picek, M Golub, D Jakobovic
International Conference on Intelligent Computing, 223-230, 2011
392011
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
382014
On the recombination operator in the real-coded genetic algorithms
S Picek, D Jakobovic, M Golub
2013 IEEE Congress on Evolutionary Computation, 3103-3110, 2013
382013
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
37*2017
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box
S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
352014
A new cost function for evolution of s-boxes
S Picek, M Cupic, L Rotim
Evolutionary computation 24 (4), 695-718, 2016
342016
Glitch it if you can: parameter search strategies for successful fault injection
RB Carpi, S Picek, L Batina, F Menarini, D Jakobovic, M Golub
International Conference on Smart Card Research and Advanced Applications …, 2013
342013
Cellular automata based S-boxes
L Mariot, S Picek, A Leporati, D Jakobovic
Cryptography and Communications 11 (1), 41-62, 2019
332019
Homomorphic encryption in the cloud
D Hrestak, S Picek
2014 37th International Convention on Information and Communication …, 2014
312014
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
302016
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
IFIP International Workshop on Information Security Theory and Practice, 140-149, 2014
292014
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
282014
Evolving cryptographically sound boolean functions
S Picek, D Jakobovic, M Golub
Proceedings of the 15th annual conference companion on Genetic and …, 2013
262013
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20