default search action
Stjepan Picek
Person information
- affiliation: Delft University of Technology, Intelligent Systems, The Netherlands
- affiliation: Radboud University, Digital Security Group, Nijmegen, The Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j50]Alexandr Polujan, Luca Mariot, Stjepan Picek:
On two open problems on the normality of bent functions. Discret. Appl. Math. 360: 115-118 (2025) - 2024
- [j49]Marko Durasevic, Domagoj Jakobovic, Stjepan Picek, Luca Mariot:
Assessing the Ability of Genetic Programming for Feature Selection in Constructing Dispatching Rules for Unrelated Machine Environments. Algorithms 17(2): 67 (2024) - [j48]Mujtaba Hassan, Arish Sateesan, Jo Vliegen, Stjepan Picek, Nele Mentens:
A Genetic Programming approach for hardware-oriented hash functions for network security applications. Appl. Soft Comput. 165: 112078 (2024) - [j47]Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
Plaintext-based Side-channel Collision Attack. IACR Commun. Cryptol. 1(3): 20 (2024) - [j46]Lichao Wu, Azade Rezaeezade, Amir Alipour, Guilherme Perin, Stjepan Picek:
Leakage Model-flexible Deep Learning-based Side-channel Analysis. IACR Commun. Cryptol. 1(3): 41 (2024) - [j45]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
Tipping the Balance: Imbalanced Classes in Deep-Learning Side-Channel Analysis. IEEE Des. Test 41(2): 32-38 (2024) - [j44]Jing Xu, Stefanos Koffas, Stjepan Picek:
Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks. DTRAP 5(2): 15:1-15:29 (2024) - [j43]Domagoj Jakobovic, Marko Durasevic, Stjepan Picek, Bruno Gasperov:
ECF: A C++ framework for evolutionary computation. SoftwareX 27: 101640 (2024) - [j42]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Ablation Analysis for Multi-Device Deep Learning-Based Physical Side-Channel Analysis. IEEE Trans. Dependable Secur. Comput. 21(3): 1331-1341 (2024) - [j41]Lichao Wu, Guilherme Perin, Stjepan Picek:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-Based Side-Channel Analysis. IEEE Trans. Emerg. Top. Comput. 12(2): 546-557 (2024) - [j40]Suvadeep Hajra, Manaar Alam, Sayandeep Saha, Stjepan Picek, Debdeep Mukhopadhyay:
On the Instability of Softmax Attention-Based Deep Learning Models in Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 19: 514-528 (2024) - [c156]Zihao Xu, Yi Liu, Gelei Deng, Yuekang Li, Stjepan Picek:
A Comprehensive Study of Jailbreak Attack versus Defense for Large Language Models. ACL (Findings) 2024: 7432-7449 - [c155]Behrad Tajalli, Stefanos Koffas, Gorka Abad, Stjepan Picek:
ELMs Under Siege: A Study on Backdoor Attacks on Extreme Learning Machines. AISec@CCS 2024: 125-136 - [c154]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. AISec@CCS 2024: 137-148 - [c153]Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric:
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market. ARC 2024: 255-266 - [c152]Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-Channel Analysis with Single Network Training and Multi-output Regression. COSADE 2024: 113-132 - [c151]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-Based Side-Channel Analysis Using Homomorphic Encryption - Opportunities and Limitations. COSADE 2024: 133-154 - [c150]Omid Bazangani, Parisa Amiri-Eliasi, Stjepan Picek, Lejla Batina:
Can Machine Learn Pipeline Leakage? DATE 2024: 1-6 - [c149]Parisa Amiri-Eliasi, Silvia Mella, Léo Weissbart, Lejla Batina, Stjepan Picek:
Xoodyak Under SCA Siege. DDECS 2024: 61-66 - [c148]Xiaoyun Xu, Oguzhan Ersoy, Behrad Tajalli, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. DSN-W 2024: 66-73 - [c147]Claude Carlet, Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Look into the Mirror: Evolving Self-dual Bent Boolean Functions. EuroGP 2024: 161-175 - [c146]Claude Carlet, Marko Durasevic, Bruno Gasperov, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A New Angle: On Evolving Rotation Symmetric Boolean Functions. EvoApplications@EvoStar 2024: 287-302 - [c145]Claude Carlet, Marko Durasevic, Domagoj Jakobovic, Stjepan Picek:
On the Evolution of Boolean Functions with the Algebraic Normal Form Representation. GECCO Companion 2024: 639-642 - [c144]Mujtaba Hassan, Jo Vliegen, Stjepan Picek, Nele Mentens:
A Systematic Exploration of Evolutionary Computation for the Design of Hardware-oriented Non-cryptographic Hash Functions. GECCO 2024 - [c143]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. NDSS 2024 - [c142]Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Stjepan Picek:
Discovering Rotation Symmetric Self-dual Bent Functions with Evolutionary Algorithms. PPSN (4) 2024: 429-445 - [c141]Christina Kreza, Stefanos Koffas, Behrad Tajalli, Mauro Conti, Stjepan Picek:
Backdoors on Manifold Learning. WiseML@WiSec 2024: 1-7 - [c140]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Beyond PhantomSponges: Enhancing Sponge Attack on Object Detection Models. WiseML@WiSec 2024: 14-19 - [e10]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14459, Springer 2024, ISBN 978-3-031-56231-0 [contents] - [e9]Anupam Chattopadhyay, Shivam Bhasin, Stjepan Picek, Chester Rebeiro:
Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14460, Springer 2024, ISBN 978-3-031-56234-1 [contents] - [i130]Gorka Abad, Stjepan Picek, Aitor Urbieta:
Time-Distributed Backdoor Attacks on Federated Spiking Learning. CoRR abs/2402.02886 (2024) - [i129]Jona te Lintelo, Stefanos Koffas, Stjepan Picek:
The SpongeNet Attack: Sponge Weight Poisoning of Deep Neural Networks. CoRR abs/2402.06357 (2024) - [i128]Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Stjepan Picek, Luca Mariot:
A Systematic Evaluation of Evolving Highly Nonlinear Boolean Functions in Odd Sizes. CoRR abs/2402.09937 (2024) - [i127]Zihao Xu, Yi Liu, Gelei Deng, Yuekang Li, Stjepan Picek:
LLM Jailbreak Attack versus Defense Techniques - A Comprehensive Study. CoRR abs/2402.13457 (2024) - [i126]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. CoRR abs/2403.15052 (2024) - [i125]Marco Arazzi, Stefanos Koffas, Antonino Nocera, Stjepan Picek:
Let's Focus: Focused Backdoor Attack against Federated Transfer Learning. CoRR abs/2404.19420 (2024) - [i124]Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom:
L2 · M = C2 Large Language Models as Covert Channels... a Systematic Analysis. CoRR abs/2405.15652 (2024) - [i123]Xiaoyun Xu, Zhuoran Liu, Stefanos Koffas, Shujian Yu, Stjepan Picek:
BAN: Detecting Backdoors Activated by Adversarial Neuron Noise. CoRR abs/2405.19928 (2024) - [i122]Zihao Xu, Yi Liu, Gelei Deng, Kailong Wang, Yuekang Li, Ling Shi, Stjepan Picek:
Continuous Embedding Attacks via Clipped Inputs in Jailbreaking Large Language Models. CoRR abs/2407.13796 (2024) - [i121]Coen Schoof, Stefanos Koffas, Mauro Conti, Stjepan Picek:
EmoBack: Backdoor Attacks Against Speaker Identification Using Emotional Prosody. CoRR abs/2408.01178 (2024) - [i120]Gorka Abad, Stjepan Picek, Lorenzo Cavallaro, Aitor Urbieta:
Context is the Key: Backdoor Attacks for In-Context Learning with Vision Transformers. CoRR abs/2409.04142 (2024) - [i119]Jiaxin Li, Gorka Abad, Stjepan Picek, Mauro Conti:
Membership Privacy Evaluation in Deep Spiking Neural Networks. CoRR abs/2409.19413 (2024) - [i118]Sengim Karayalcin, Guilherme Perin, Stjepan Picek:
Diffuse Some Noise: Diffusion Models for Measurement Noise Removal in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2024: 966 (2024) - [i117]David Gérault, Anna Hambitzer, Moritz Huppert, Stjepan Picek:
SoK: 5 Years of Neural Differential Cryptanalysis. IACR Cryptol. ePrint Arch. 2024: 1300 (2024) - [i116]Kota Yoshida, Sengim Karayalcin, Stjepan Picek:
Can KANs Do It? Toward Interpretable Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2024: 1570 (2024) - 2023
- [j39]Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek, Marko Ðurasevic:
NeuroSCA: Evolving Activation Functions for Side-Channel Analysis. IEEE Access 11: 284-299 (2023) - [j38]Luca Mariot, Stjepan Picek, Radinka Yorgova:
On McEliece-Type Cryptosystems Using Self-Dual Codes With Large Minimum Weight. IEEE Access 11: 43511-43519 (2023) - [j37]Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA. Algorithms 16(3): 127 (2023) - [j36]Claude Carlet, Stjepan Picek:
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. Adv. Math. Commun. 17(6): 1507-1525 (2023) - [j35]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions. Cryptogr. Commun. 15(6): 1171-1197 (2023) - [j34]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j33]Maximilien Gadouleau, Luca Mariot, Stjepan Picek:
Bent functions in the partial spread class generated by linear recurring sequences. Des. Codes Cryptogr. 91(1): 63-82 (2023) - [j32]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis. J. Cryptogr. Eng. 13(3): 311-324 (2023) - [j31]Arthur Mercier, Nikita Smolin, Oliver Sihlovec, Stefanos Koffas, Stjepan Picek:
Backdoor Pony: Evaluating backdoor attacks and defenses in different domains. SoftwareX 22: 101387 (2023) - [j30]Arthur Beckers, Sylvain Guilley, Philippe Maurine, Colin O'Flynn, Stjepan Picek:
(Adversarial) Electromagnetic Disturbance in the Industry. IEEE Trans. Computers 72(2): 414-422 (2023) - [j29]Lichao Wu, Léo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [c139]Trevor Yap, Stjepan Picek, Shivam Bhasin:
Beyond the Last Layer: Deep Feature Loss Functions in Side-channel Analysis. ASHES@CCS 2023: 73-82 - [c138]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CCS 2023: 1482-1495 - [c137]Xiaoyun Xu, Stjepan Picek:
Poster: Boosting Adversarial Robustness by Adversarial Pre-training. CCS 2023: 3540-3542 - [c136]Jing Xu, Stjepan Picek:
Poster: Multi-target & Multi-trigger Backdoor Attacks on Graph Neural Networks. CCS 2023: 3570-3572 - [c135]Behrad Tajalli, Gorka Abad, Stjepan Picek:
Poster: Backdoor Attack on Extreme Learning Machines. CCS 2023: 3588-3590 - [c134]Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. DATE 2023: 1-6 - [c133]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. DSN-W 2023: 129-135 - [c132]Jing Xu, Stefanos Koffas, Oguzhan Ersoy, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. EuroS&P 2023: 1179-1197 - [c131]Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek:
Evolutionary Strategies for the Design of Binary Linear Codes. EvoCOP 2023: 114-129 - [c130]Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek:
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. EvoApplications@EvoStar 2023: 237-252 - [c129]Mujtaba Hassan, Arish Sateesan, Jo Vliegen, Stjepan Picek, Nele Mentens:
Evolving Non-cryptographic Hash Functions Using Genetic Programming for High-speed Lookups in Network Security Applications. EvoApplications@EvoStar 2023: 302-318 - [c128]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. FPL 2023: 271-276 - [c127]Marko Durasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. GECCO Companion 2023: 199-202 - [c126]Carlos A. Coello Coello, Marko Durasevic, Domagoj Jakobovic, Marina Krcek, Luca Mariot, Stjepan Picek:
Modeling Strong Physically Unclonable Functions with Metaheuristics. GECCO Companion 2023: 719-722 - [c125]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti:
Going in Style: Audio Backdoors Through Stylistic Transformations. ICASSP 2023: 1-5 - [c124]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. IJCNN 2023: 1-8 - [c123]Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin, Kaitai Liang:
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. NDSS 2023 - [c122]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. NDSS 2023 - [c121]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the Lookup Table-Based Affine Masking Scheme. SAC 2023: 82-96 - [c120]Gorka Abad, Servio Paguada, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Sniper Backdoor: Single Client Targeted Backdoor Attack in Federated Learning. SaTML 2023: 377-391 - [c119]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. SP (Workshops) 2023: 84-93 - [e8]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i115]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A Survey of Metaheuristic Algorithms for the Design of Cryptographic Boolean Functions. CoRR abs/2301.08012 (2023) - [i114]Xiaoyun Xu, Oguzhan Ersoy, Stjepan Picek:
Universal Soldier: Using Universal Adversarial Perturbations for Detecting Backdoor Attacks. CoRR abs/2302.00747 (2023) - [i113]Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek:
A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification. CoRR abs/2302.01740 (2023) - [i112]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Digging Deeper: Operator Analysis for Optimizing Nonlinearity of Boolean Functions. CoRR abs/2302.05890 (2023) - [i111]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Aitor Urbieta:
Sneaky Spikes: Uncovering Stealthy Backdoor Attacks in Spiking Neural Networks with Neuromorphic Data. CoRR abs/2302.06279 (2023) - [i110]Behrad Tajalli, Oguzhan Ersoy, Stjepan Picek:
On Feasibility of Server-side Backdoor Attacks on Split Learning. CoRR abs/2302.09578 (2023) - [i109]Xiaoyun Xu, Guilherme Perin, Stjepan Picek:
IB-RAR: Information Bottleneck as Regularizer for Adversarial Robustness. CoRR abs/2302.10896 (2023) - [i108]Jing Xu, Gorka Abad, Stjepan Picek:
Rethinking the Trigger-injecting Position in Graph Backdoor Attack. CoRR abs/2304.02277 (2023) - [i107]Marco Arazzi, Mauro Conti, Antonino Nocera, Stjepan Picek:
Turning Privacy-preserving Mechanisms against Federated Learning. CoRR abs/2305.05355 (2023) - [i106]Huimin Li, Phillip Rieger, Shaza Zeitouni, Stjepan Picek, Ahmad-Reza Sadeghi:
FLAIRS: FPGA-Accelerated Inference-Resistant & Secure Federated Learning. CoRR abs/2308.00553 (2023) - [i105]Marco Arazzi, Mauro Conti, Stefanos Koffas, Marina Krcek, Antonino Nocera, Stjepan Picek, Jing Xu:
BlindSage: Label Inference Attacks against Node-level Vertical Federated Graph Neural Networks. CoRR abs/2308.02465 (2023) - [i104]Mauro Conti, Nicola Farronato, Stefanos Koffas, Luca Pajola, Stjepan Picek:
Invisible Threats: Backdoor Attack in OCR Systems. CoRR abs/2310.08259 (2023) - [i103]Yang Chen, Stjepan Picek, Zhonglin Ye, Zhaoyang Wang, Haixing Zhao:
Momentum Gradient-based Untargeted Attack on Hypergraph Neural Networks. CoRR abs/2310.15656 (2023) - [i102]Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha A. Larson, Stjepan Picek:
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data. CoRR abs/2311.07550 (2023) - [i101]Claude Carlet, Marko Ðurasevic, Bruno Gasperov, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
A New Angle: On Evolving Rotation Symmetric Boolean Functions. CoRR abs/2311.11881 (2023) - [i100]Claude Carlet, Marko Ðurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Look into the Mirror: Evolving Self-Dual Bent Boolean Functions. CoRR abs/2311.11884 (2023) - [i99]Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek:
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs. CoRR abs/2312.03853 (2023) - [i98]Xiaoyun Xu, Shujian Yu, Jingzheng Wu, Stjepan Picek:
MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness. CoRR abs/2312.04960 (2023) - [i97]Lichao Wu, Guilherme Perin, Stjepan Picek:
Hiding in Plain Sight: Non-profiling Deep Learning-based Side-channel Analysis with Plaintext/Ciphertext. IACR Cryptol. ePrint Arch. 2023: 209 (2023) - [i96]Lichao Wu, Guilherme Perin, Stjepan Picek:
Not so Difficult in the End: Breaking the ASCADv2 Dataset. IACR Cryptol. ePrint Arch. 2023: 724 (2023) - [i95]Marina Krcek, Thomas Ordas, Stjepan Picek:
Short paper: Diversity Methods for Laser Fault Injection to Improve Location Coverage. IACR Cryptol. ePrint Arch. 2023: 893 (2023) - [i94]Trevor Yap, Shivam Bhasin, Stjepan Picek:
OccPoIs: Points of Interest based on Neural Network's Key Recovery in Side-Channel Analysis through Occlusion. IACR Cryptol. ePrint Arch. 2023: 1055 (2023) - [i93]Marina Krcek, Lichao Wu, Guilherme Perin, Stjepan Picek:
Shift-invariance Robustness of Convolutional Neural Networks in Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1100 (2023) - [i92]Sengim Karayalcin, Marina Krcek, Lichao Wu, Stjepan Picek, Guilherme Perin:
It's a Kind of Magic: A Novel Conditional GAN Framework for Efficient Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1108 (2023) - [i91]Lichao Wu, Sébastien Tiran, Guilherme Perin, Stjepan Picek:
An End-to-end Plaintext-based Side-channel Collision Attack without Trace Segmentation. IACR Cryptol. ePrint Arch. 2023: 1109 (2023) - [i90]Lichao Wu, Amir Ali-pour, Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
Breaking Free: Leakage Model-free Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2023: 1110 (2023) - [i89]Fabian Schmid, Shibam Mukherjee, Stjepan Picek, Marc Stöttinger, Fabrizio De Santis, Christian Rechberger:
Towards Private Deep Learning-based Side-Channel Analysis using Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1252 (2023) - [i88]Léo Weissbart, Stjepan Picek:
Lightweight but Not Easy: Side-channel Analysis of the Ascon Authenticated Cipher on a 32-bit Microcontroller. IACR Cryptol. ePrint Arch. 2023: 1598 (2023) - [i87]Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023) - [i86]Ioana Savu, Marina Krcek, Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for MORE: Unsupervised Side-channel Analysis with Single Network Training and Multi-output Regression. IACR Cryptol. ePrint Arch. 2023: 1681 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [j27]Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato:
On the feasibility of crawling-based attacks against recommender systems. J. Comput. Secur. 30(4): 599-621 (2022) - [j26]Yier Jin, Tsung-Yi Ho, Stjepan Picek, Siddharth Garg:
Guest Editorial: Trustworthy AI. ACM J. Emerg. Technol. Comput. Syst. 18(3): 55:1-55:3 (2022) - [j25]Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 413-437 (2022) - [j24]Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(4): 828-861 (2022) - [c118]Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds. ACNS Workshops 2022: 165-182 - [c117]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c116]Jing Xu, Rui Wang, Stefanos Koffas, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. ACSAC 2022: 684-698 - [c115]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, or Not to Overfit: Improving the Performance of Deep Learning-Based SCA. AFRICACRYPT 2022: 397-421 - [c114]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. AICAS 2022: 320-323 - [c113]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. AISec@CCS 2022: 1-12 - [c112]Gorka Abad, Oguzhan Ersoy, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Poster: Backdoor Attacks on Spiking NNs and Neuromorphic Datasets. CCS 2022: 3315-3317 - [c111]Jing Xu, Stjepan Picek:
Poster: Clean-label Backdoor Attack on Graph Neural Networks. CCS 2022: 3491-3493 - [c110]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
Evolutionary Construction of Perfectly Balanced Boolean Functions. CEC 2022: 1-8 - [c109]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis. COSADE 2022: 29-48 - [c108]Lichao Wu, Guilherme Perin, Stjepan Picek:
On the Evaluation of Deep Learning-Based Side-Channel Analysis. COSADE 2022: 49-71 - [c107]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [c106]Huimin Li, Nele Mentens, Stjepan Picek:
A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber. DAC 2022: 733-738 - [c105]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
On the Difficulty of Evolving Permutation Codes. EvoApplications 2022: 141-156 - [c104]Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. FDTC 2022: 18-29 - [c103]Claude Carlet, Domagoj Jakobovic, Stjepan Picek:
On generalizing the power function exponent constructions with genetic programming. GECCO Companion 2022: 691-694 - [c102]Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Evolving constructions for balanced, highly nonlinear boolean functions. GECCO 2022: 1147-1155 - [c101]Stjepan Picek, Domagoj Jakobovic:
Evolutionary computation and machine learning in security. GECCO Companion 2022: 1572-1601 - [c100]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. USENIX Security Symposium 2022: 1687-1704 - [c99]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It?: Backdoor Attacks via Ultrasonic Triggers. WiseML@WiSec 2022: 57-62 - [e7]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e6]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2 [contents] - [e5]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5 [contents] - [e4]Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7 [contents] - [i85]Jing Xu, Rui Wang, Kaitai Liang, Stjepan Picek:
More is Better (Mostly): On the Backdoor Attacks in Federated Graph Neural Networks. CoRR abs/2202.03195 (2022) - [i84]Carlos A. Coello Coello, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Modeling Strong Physically Unclonable Functions with Metaheuristics. CoRR abs/2202.08079 (2022) - [i83]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
Evolutionary Construction of Perfectly Balanced Boolean Functions. CoRR abs/2202.08221 (2022) - [i82]Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Stjepan Picek:
Evolving Constructions for Balanced, Highly Nonlinear Boolean Functions. CoRR abs/2202.08743 (2022) - [i81]Stefanos Koffas, Stjepan Picek, Mauro Conti:
Dynamic Backdoors with Global Average Pooling. CoRR abs/2203.02079 (2022) - [i80]Gorka Abad, Servio Paguada, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta:
Client-Wise Targeted Backdoor in Federated Learning. CoRR abs/2203.08689 (2022) - [i79]Mauro Conti, Jiaxin Li, Stjepan Picek, Jing Xu:
Label-Only Membership Inference Attack against Node-Level Graph Neural Networks. CoRR abs/2207.13766 (2022) - [i78]Rui Wang, Xingkai Wang, Huanhuan Chen, Stjepan Picek, Zhen Liu, Kaitai Liang:
BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering. CoRR abs/2208.10161 (2022) - [i77]Patrick Jauernig, Domagoj Jakobovic, Stjepan Picek, Emmanuel Stapf, Ahmad-Reza Sadeghi:
DARWIN: Survival of the Fittest Fuzzing Mutators. CoRR abs/2210.11783 (2022) - [i76]Mauro Conti, Jiaxin Li, Stjepan Picek:
On the Vulnerability of Data Points under Multiple Membership Inference Attacks and Target Models. CoRR abs/2210.16258 (2022) - [i75]Stefanos Koffas, Luca Pajola, Stjepan Picek, Mauro Conti:
Going In Style: Audio Backdoors Through Stylistic Transformations. CoRR abs/2211.03117 (2022) - [i74]Claude Carlet, Luca Mariot, Luca Manzoni, Stjepan Picek:
Evolutionary Strategies for the Design of Binary Linear Codes. CoRR abs/2211.11551 (2022) - [i73]Marko Djurasevic, Domagoj Jakobovic, Luca Mariot, Sihem Mesnager, Stjepan Picek:
On the Evolution of Boomerang Uniformity in Cryptographic S-boxes. CoRR abs/2212.04789 (2022) - [i72]Nele Mentens, Stjepan Picek, Ahmad-Reza Sadeghi:
Intelligent Security: Is "AI for Cybersecurity" a Blessing or a Curse (Dagstuhl Seminar 22412). Dagstuhl Reports 12(10): 106-128 (2022) - [i71]Marina Krcek, Thomas Ordas, Daniele Fronte, Stjepan Picek:
The More You Know: Improving Laser Fault Injection with Prior Knowledge. IACR Cryptol. ePrint Arch. 2022: 306 (2022) - [i70]Azade Rezaeezade, Guilherme Perin, Stjepan Picek:
To Overfit, Or Not to Overfit: Improving the Performance of Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2022: 340 (2022) - [i69]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. IACR Cryptol. ePrint Arch. 2022: 341 (2022) - [i68]Huimin Li, Nele Mentens, Stjepan Picek:
Maximizing the Potential of Custom RISC-V Vector Extensions for Speeding up SHA-3 Hash Functions. IACR Cryptol. ePrint Arch. 2022: 868 (2022) - [i67]Sengim Karayalcin, Stjepan Picek:
Resolving the Doubts: On the Construction and Use of ResNets for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 963 (2022) - [i66]Guilherme Perin, Lichao Wu, Stjepan Picek:
I Know What Your Layers Did: Layer-wise Explainability of Deep Learning Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1087 (2022) - [i65]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - 2021
- [j23]Jing Xu, Gongliu Yang, Yiding Sun, Stjepan Picek:
A Multi-Sensor Information Fusion Method Based on Factor Graph for Integrated Navigation System. IEEE Access 9: 12044-12054 (2021) - [j22]Domagoj Jakobovic, Stjepan Picek, Marcella S. R. Martins, Markus Wagner:
Toward more efficient heuristic construction of Boolean functions. Appl. Soft Comput. 107: 107327 (2021) - [j21]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
Evolutionary algorithms for designing reversible cellular automata. Genet. Program. Evolvable Mach. 22(4): 429-461 (2021) - [j20]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [j19]Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 677-707 (2021) - [c98]Stjepan Picek, Annelie Heuser, Guilherme Perin, Sylvain Guilley:
Profiled Side-Channel Analysis in the Efficient Attacker Framework. CARDIS 2021: 44-63 - [c97]Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek:
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. CARDIS 2021: 80-96 - [c96]Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis. COSADE 2021: 53-81 - [c95]Marina Krcek, Daniele Fronte, Stjepan Picek:
On the Importance of Initial Solutions Selection in Fault Injection. FDTC 2021: 1-12 - [c94]Claude Carlet, Domagoj Jakobovic, Stjepan Picek:
Evolutionary algorithms-assisted construction of cryptographic boolean functions. GECCO 2021: 565-573 - [c93]Domagoj Jakobovic, Luca Manzoni, Luca Mariot, Stjepan Picek, Mauro Castelli:
CoInGP: convolutional inpainting with genetic programming. GECCO 2021: 795-803 - [c92]Stjepan Picek, Domagoj Jakobovic:
Evolutionary computation and machine learning in cryptology. GECCO Companion 2021: 1089-1118 - [c91]Lucija Planinic, Marko Djurasevic, Luca Mariot, Domagoj Jakobovic, Stjepan Picek, Carlos A. Coello Coello:
On the genotype compression and expansion for evolutionary algorithms in the continuous domain. GECCO Companion 2021: 1208-1216 - [c90]Burak Yildiz, Hayley Hung, Jesse H. Krijthe, Cynthia C. S. Liem, Marco Loog, Gosia Migut, Frans A. Oliehoek, Annibale Panichella, Przemyslaw Pawelczak, Stjepan Picek, Mathijs de Weerdt, Jan van Gemert:
ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility. RRPR 2021: 3-11 - [c89]Jing Xu, Minhui (Jason) Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. WiseML@WiSec 2021: 31-36 - [p1]Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145 - [e3]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i64]Jing Xu, Minhui (Jason) Xue, Stjepan Picek:
Explainability-based Backdoor Attacks Against Graph Neural Networks. CoRR abs/2104.03674 (2021) - [i63]Lucija Planinic, Marko Djurasevic, Luca Mariot, Domagoj Jakobovic, Stjepan Picek, Carlos A. Coello Coello:
On the Genotype Compression and Expansion for Evolutionary Algorithms in the Continuous Domain. CoRR abs/2105.11502 (2021) - [i62]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
Evolutionary Algorithms for Designing Reversible Cellular Automata. CoRR abs/2105.12039 (2021) - [i61]Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek:
Can You Hear It? Backdoor Attacks via Ultrasonic Triggers. CoRR abs/2107.14569 (2021) - [i60]Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Simone Milani, Stjepan Picek, Eugen Saraci:
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand. CoRR abs/2110.08113 (2021) - [i59]Jing Xu, Stjepan Picek:
Watermarking Graph Neural Networks based on Backdoor Attacks. CoRR abs/2110.11024 (2021) - [i58]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Marko Djurasevic, Alberto Leporati:
On the Difficulty of Evolving Permutation Codes. CoRR abs/2111.13252 (2021) - [i57]Gorka Abad, Stjepan Picek, Aitor Urbieta:
SoK: On the Security & Privacy in Federated Learning. CoRR abs/2112.05423 (2021) - [i56]Maximilien Gadouleau, Luca Mariot, Stjepan Picek:
Bent Functions in the Partial Spread Class Generated by Linear Recurring Sequences. CoRR abs/2112.08705 (2021) - [i55]Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 71 (2021) - [i54]Guilherme Perin, Lichao Wu, Stjepan Picek:
Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2021: 197 (2021) - [i53]Karlo Knezevic, Juraj Fulir, Domagoj Jakobovic, Stjepan Picek:
NeuroSCA: Evolving Activation Functions for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 249 (2021) - [i52]Guilherme Perin, Lichao Wu, Stjepan Picek:
AISY - Deep Learning-based Framework for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 357 (2021) - [i51]Jorai Rijsdijk, Lichao Wu, Guilherme Perin, Stjepan Picek:
Reinforcement Learning-based Design of Side-channel Countermeasures. IACR Cryptol. ePrint Arch. 2021: 526 (2021) - [i50]Lichao Wu, Yoo-Seung Won, Dirmanto Jap, Guilherme Perin, Shivam Bhasin, Stjepan Picek:
Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 717 (2021) - [i49]Luca Mariot, Stjepan Picek, Radinka Yorgova:
On McEliece type cryptosystems using self-dual codes with large minimum weight. IACR Cryptol. ePrint Arch. 2021: 837 (2021) - [i48]Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek:
A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage. IACR Cryptol. ePrint Arch. 2021: 905 (2021) - [i47]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-channel Analysis of Curve25519 with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 944 (2021) - [i46]Lichao Wu, Guilherme Perin, Stjepan Picek:
On the Evaluation of Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 952 (2021) - [i45]Lichao Wu, Guilherme Perin, Stjepan Picek:
The Best of Two Worlds: Deep Learning-assisted Template Attack. IACR Cryptol. ePrint Arch. 2021: 959 (2021) - [i44]Sudharshan Swaminathan, Lukasz Chmielewski, Guilherme Perin, Stjepan Picek:
Deep Learning-based Side-channel Analysis against AES Inner Rounds. IACR Cryptol. ePrint Arch. 2021: 981 (2021) - [i43]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices. IACR Cryptol. ePrint Arch. 2021: 991 (2021) - [i42]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
No (Good) Loss no Gain: Systematic Evaluation of Loss functions in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1091 (2021) - [i41]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021) - [i40]Maikel Kerkhof, Lichao Wu, Guilherme Perin, Stjepan Picek:
Focus is Key to Success: A Focal Loss Function for Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1408 (2021) - [i39]Guilherme Perin, Lichao Wu, Stjepan Picek:
Exploring Feature Selection Scenarios for Deep Learning-based Side-Channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1414 (2021) - [i38]Guilherme Perin, Lichao Wu, Stjepan Picek:
The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-based SCA. IACR Cryptol. ePrint Arch. 2021: 1592 (2021) - [i37]Huimin Li, Nele Mentens, Stjepan Picek:
A Scalable SIMD RISC-V based Processor with Customized Vector Extensions for CRYSTALS-Kyber. IACR Cryptol. ePrint Arch. 2021: 1648 (2021) - 2020
- [j18]Mansoureh Labafniya, Stjepan Picek, Shahram Etemadi Borujeni, Nele Mentens:
On the feasibility of using evolvable hardware for hardware Trojan detection and prevention. Appl. Soft Comput. 91: 106247 (2020) - [j17]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Xiang-dong Hou, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Luca Mariot, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Razvan Rosie, Natalia N. Tokareva:
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions. Cryptologia 44(3): 223-256 (2020) - [j16]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-Channel Analysis of Curve25519 with Machine Learning. J. Hardw. Syst. Secur. 4(4): 314-328 (2020) - [j15]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Lightweight Ciphers and Their Side-Channel Resilience. IEEE Trans. Computers 69(10): 1434-1448 (2020) - [j14]Guilherme Perin, Lukasz Chmielewski, Stjepan Picek:
Strength in Numbers: Improving Generalization with Ensembles in Machine Learning-based Profiled Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 337-364 (2020) - [j13]Lichao Wu, Stjepan Picek:
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(4): 389-415 (2020) - [c88]Daan van der Valk, Stjepan Picek, Shivam Bhasin:
Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis. COSADE 2020: 175-199 - [c87]Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, Stjepan Picek:
A Fast Characterization Method for Semi-invasive Fault Injection Attacks. CT-RSA 2020: 146-170 - [c86]Daan van der Valk, Marina Krcek, Stjepan Picek, Shivam Bhasin:
Learning From A Big Brother - Mimicking Neural Networks in Profiled Side-channel Analysis. DAC 2020: 1-6 - [c85]Fabio Aiolli, Mauro Conti, Stjepan Picek, Mirko Polato:
Big Enough to Care Not Enough to Scare! Crawling to Attack Recommender Systems. ESORICS (2) 2020: 165-184 - [c84]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
An Evolutionary View on Reversible Shift-Invariant Transformations. EuroGP 2020: 118-134 - [c83]Karlo Knezevic, Stjepan Picek, Domagoj Jakobovic, Julio C. Hernandez-Castro:
What Is Your MOVE: Modeling Adversarial Network Environments. EvoApplications 2020: 260-275 - [c82]Luca Manzoni, Domagoj Jakobovic, Luca Mariot, Stjepan Picek, Mauro Castelli:
Towards an evolutionary-based approach for natural language processing. GECCO 2020: 985-993 - [c81]Marko Djurasevic, Domagoj Jakobovic, Stjepan Picek:
One property to rule them all?: on the limits of trade-offs for S-boxes. GECCO 2020: 1064-1072 - [c80]Stjepan Picek, Domagoj Jakobovic:
Evolutionary computation and machine learning in cryptology. GECCO Companion 2020: 1147-1173 - [c79]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. NDSS 2020 - [c78]Marko Durasevic, Domagoj Jakobovic, Marcella Scoczynski Ribeiro Martins, Stjepan Picek, Markus Wagner:
Fitness Landscape Analysis of Dimensionally-Aware Genetic Programming Featuring Feynman Equations. PPSN (2) 2020: 111-124 - [c77]Claude Carlet, Marko Djurasevic, Domagoj Jakobovic, Stjepan Picek:
A Search for Additional Structure: The Case of Cryptographic S-boxes. PPSN (2) 2020: 343-356 - [c76]Guilherme Perin, Stjepan Picek:
On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis. SAC 2020: 615-636 - [e2]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [e1]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings. Lecture Notes in Computer Science 12586, Springer 2020, ISBN 978-3-030-66625-5 [contents] - [i36]Domagoj Jakobovic, Luca Manzoni, Luca Mariot, Stjepan Picek:
CoInGP: Convolutional Inpainting with Genetic Programming. CoRR abs/2004.11300 (2020) - [i35]Marko Durasevic, Domagoj Jakobovic, Marcella Scoczynski Ribeiro Martins, Stjepan Picek, Markus Wagner:
Fitness Landscape Analysis of Dimensionally-Aware Genetic Programming Featuring Feynman Equations. CoRR abs/2004.12762 (2020) - [i34]Luca Manzoni, Domagoj Jakobovic, Luca Mariot, Stjepan Picek, Mauro Castelli:
Towards an evolutionary-based approach for natural language processing. CoRR abs/2004.13832 (2020) - [i33]Burak Yildiz, Hayley Hung, Jesse H. Krijthe, Cynthia C. S. Liem, Marco Loog, Gosia Migut, Frans A. Oliehoek, Annibale Panichella, Przemyslaw Pawelczak, Stjepan Picek, Mathijs de Weerdt, Jan van Gemert:
ReproducedPapers.org: Openly teaching and structuring machine learning reproducibility. CoRR abs/2012.01172 (2020) - [i32]Guilherme Perin, Ileana Buhan, Stjepan Picek:
Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis. IACR Cryptol. ePrint Arch. 2020: 58 (2020) - [i31]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Cryptol. ePrint Arch. 2020: 891 (2020) - [i30]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020) - [i29]Guilherme Perin, Stjepan Picek:
On the Influence of Optimizers in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020: 977 (2020) - [i28]Maximilien Gadouleau, Luca Mariot, Stjepan Picek:
Bent Functions from Cellular Automata. IACR Cryptol. ePrint Arch. 2020: 1272 (2020) - [i27]Lichao Wu, Guilherme Perin, Stjepan Picek:
I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2020: 1293 (2020)
2010 – 2019
- 2019
- [j12]Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic:
Cellular automata based S-boxes. Cryptogr. Commun. 11(1): 41-62 (2019) - [j11]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Svetla Nikova, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Vincent Rijmen, Natalia N. Tokareva:
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO). Cryptologia 43(2): 138-174 (2019) - [j10]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(1): 209-237 (2019) - [j9]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise. Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2019(3): 148-179 (2019) - [j8]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina:
A Systematic Evaluation of Profiling Through Focused Feature Selection. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2802-2815 (2019) - [c75]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c74]Stjepan Picek, Dirmanto Jap, Shivam Bhasin:
Poster: When Adversary Becomes the Guardian - Towards Side-channel Security With Adversarial Attacks. CCS 2019: 2673-2675 - [c73]Luca Mariot, Domagoj Jakobovic, Alberto Leporati, Stjepan Picek:
Hyper-bent Boolean Functions and Evolutionary Algorithms. EuroGP 2019: 262-277 - [c72]Walter O. Krawec, Stjepan Picek, Domagoj Jakobovic:
Evolutionary Algorithms for the Design of Quantum Protocols. EvoApplications 2019: 220-236 - [c71]Domagoj Jakobovic, Stjepan Picek, Marcella S. R. Martins, Markus Wagner:
A characterisation of S-box fitness landscapes in cryptography. GECCO 2019: 285-293 - [c70]Stjepan Picek, Domagoj Jakobovic:
On the design of S-box constructions with genetic programming. GECCO (Companion) 2019: 395-396 - [c69]Stjepan Picek, Karlo Knezevic, Domagoj Jakobovic, Ante Derek:
C3PO: cipher construction with cartesian genetic programming. GECCO (Companion) 2019: 1625-1633 - [c68]Stjepan Picek:
Challenges in Deep Learning-Based Profiled Side-Channel Analysis. SPACE 2019: 9-12 - [c67]Leo Weissbart, Stjepan Picek, Lejla Batina:
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA. SPACE 2019: 86-105 - [c66]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [i26]Domagoj Jakobovic, Stjepan Picek, Marcella S. R. Martins, Markus Wagner:
A characterisation of S-box fitness landscapes in cryptography. CoRR abs/1902.04724 (2019) - [i25]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Xiang-dong Hou, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Luca Mariot, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Razvan Rosie, Natalia N. Tokareva:
The Fifth International Students' Olympiad in Cryptography - NSUCRYPTO: problems and their solutions. CoRR abs/1906.04480 (2019) - [i24]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Profiling Side-channel Analysis in the Restricted Attacker Framework. IACR Cryptol. ePrint Arch. 2019: 168 (2019) - [i23]Leo Weissbart, Stjepan Picek, Lejla Batina:
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. IACR Cryptol. ePrint Arch. 2019: 358 (2019) - [i22]Daan van der Valk, Stjepan Picek:
Bias-variance Decomposition in Machine Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 570 (2019) - [i21]Shivam Bhasin, Anupam Chattopadhyay, Annelie Heuser, Dirmanto Jap, Stjepan Picek, Ritu Ranjan Shrivastwa:
Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 661 (2019) - [i20]Lichao Wu, Gerard Ribera, Stjepan Picek:
A Fast Characterization Method for Optical Fault Injection. IACR Cryptol. ePrint Arch. 2019: 866 (2019) - [i19]Lichao Wu, Stjepan Picek:
Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders. IACR Cryptol. ePrint Arch. 2019: 1474 (2019) - [i18]Leo Weissbart, Stjepan Picek, Lejla Batina:
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1476 (2019) - [i17]Daan van der Valk, Stjepan Picek, Shivam Bhasin:
Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1477 (2019) - 2018
- [j7]Stjepan Picek, Carlos A. Coello Coello, Domagoj Jakobovic, Nele Mentens:
Finding short and implementation-friendly addition chains with evolutionary algorithms. J. Heuristics 24(3): 457-481 (2018) - [j6]Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules. IACR Trans. Symmetric Cryptol. 2018(3): 311-334 (2018) - [c65]Zakaria Najm, Dirmanto Jap, Bernhard Jungk, Stjepan Picek, Shivam Bhasin:
On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers. APCCAS 2018: 552-555 - [c64]Stjepan Picek, Annelie Heuser, Alan Jovic, Karlo Knezevic, Tania Richmond:
Improving Side-Channel Analysis Through Semi-supervised Learning. CARDIS 2018: 35-50 - [c63]Stjepan Picek, Karlo Knezevic, Domagoj Jakobovic, Claude Carlet:
A Search for Differentially-6 Uniform (n, n-2) Functions. CEC 2018: 1-7 - [c62]Stjepan Picek, Karlo Knezevic, Luca Mariot, Domagoj Jakobovic, Alberto Leporati:
Evolving Bent Quaternary Functions. CEC 2018: 1-8 - [c61]Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch:
Higher order side-channel attack resilient S-boxes. CF 2018: 336-341 - [c60]Antun Maldini, Niels Samwel, Stjepan Picek, Lejla Batina:
Genetic Algorithm-Based Electromagnetic Fault Injection. FDTC 2018: 35-42 - [c59]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
Evolutionary Search of Binary Orthogonal Arrays. PPSN (1) 2018: 121-133 - [c58]Gisele Lobo Pappa, Michael T. M. Emmerich, Ana L. C. Bazzan, Will N. Browne, Kalyanmoy Deb, Carola Doerr, Marko Durasevic, Michael G. Epitropakis, Saemundur O. Haraldsson, Domagoj Jakobovic, Pascal Kerschke, Krzysztof Krawiec, Per Kristian Lehre, Xiaodong Li, Andrei Lissovoi, Pekka Malo, Luis Martí, Yi Mei, Juan Julián Merelo Guervós, Julian F. Miller, Alberto Moraglio, Antonio J. Nebro, Su Nguyen, Gabriela Ochoa, Pietro S. Oliveto, Stjepan Picek, Nelishia Pillay, Mike Preuss, Marc Schoenauer, Roman Senkerik, Ankur Sinha, Ofer M. Shir, Dirk Sudholt, L. Darrell Whitley, Mark Wineberg, John R. Woodward, Mengjie Zhang:
Tutorials at PPSN 2018. PPSN (2) 2018: 477-489 - [c57]Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, Axel Legay:
On the Performance of Convolutional Neural Networks for Side-Channel Analysis. SPACE 2018: 157-176 - [c56]Karlo Knezevic, Stjepan Picek, Luca Mariot, Domagoj Jakobovic, Alberto Leporati:
The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms. TPNC 2018: 152-163 - [i16]Anastasiya Gorodilova, Sergey Agievich, Claude Carlet, Evgeny Gorkunov, Valeriya Idrisova, Nikolay Kolomeec, Alexandr Kutsenko, Svetla Nikova, Alexey Oblaukhov, Stjepan Picek, Bart Preneel, Vincent Rijmen, Natalia N. Tokareva:
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO. CoRR abs/1806.02059 (2018) - [i15]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. CoRR abs/1810.09076 (2018) - [i14]Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay:
On the Performance of Deep Learning for Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 4 (2018) - [i13]Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch:
Higher Order Side-Channel Attacks Resilient S-boxes. IACR Cryptol. ePrint Arch. 2018: 6 (2018) - [i12]Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, Francesco Regazzoni:
The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations. IACR Cryptol. ePrint Arch. 2018: 476 (2018) - [i11]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. IACR Cryptol. ePrint Arch. 2018: 477 (2018) - [i10]Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules. IACR Cryptol. ePrint Arch. 2018: 832 (2018) - [i9]Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, Alan Hanjalic:
Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 1023 (2018) - [i8]Stjepan Picek, Annelie Heuser, Cesare Alippi, Francesco Regazzoni:
When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis. IACR Cryptol. ePrint Arch. 2018: 1123 (2018) - 2017
- [j5]Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic:
Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties. Eng. Appl. Artif. Intell. 62: 320-330 (2017) - [j4]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template attack versus Bayes classifier. J. Cryptogr. Eng. 7(4): 343-351 (2017) - [c55]Claude Carlet, Annelie Heuser, Stjepan Picek:
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience. ACNS 2017: 393-414 - [c54]Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay:
Climbing Down the Hierarchy: Hierarchical Classification for Machine Learning Side-Channel Attacks. AFRICACRYPT 2017: 61-78 - [c53]Stjepan Picek, Erik Hemberg, Una-May O'Reilly:
If You Can't Measure It, You Can't Improve It: Moving Target Defense Metrics. MTD@CCS 2017: 115-118 - [c52]Stjepan Picek, Karlo Knezevic, Domagoj Jakobovic:
On the evolution of bent (n, m) functions. CEC 2017: 2137-2144 - [c51]Stjepan Picek, Luca Mariot, Bohan Yang, Domagoj Jakobovic, Nele Mentens:
Design of S-boxes Defined with Cellular Automata Rules. Conf. Computing Frontiers 2017: 409-414 - [c50]Liran Lerman, Nikita Veshchikov, Stjepan Picek, Olivier Markowitch:
On the Construction of Side-Channel Attack Resilient S-boxes. COSADE 2017: 102-119 - [c49]Rebeka Coric, Stjepan Picek, Domagoj Jakobovic, Carlos A. Coello Coello:
On the mutual information as a fitness landscape measure. GECCO (Companion) 2017: 165-166 - [c48]Stjepan Picek, Luca Mariot, Alberto Leporati, Domagoj Jakobovic:
Evolving S-boxes based on cellular automata with genetic programming. GECCO (Companion) 2017: 251-252 - [c47]Luca Mariot, Stjepan Picek, Domagoj Jakobovic, Alberto Leporati:
Evolutionary algorithms for the design of orthogonal latin squares based on cellular automata. GECCO 2017: 306-313 - [c46]Stjepan Picek:
Evolutionary computation and cryptology. GECCO (Companion) 2017: 1066-1093 - [c45]Karlo Knezevic, Stjepan Picek, Julian F. Miller:
Amplitude-oriented mixed-type CGP classification. GECCO (Companion) 2017: 1415-1418 - [c44]Stjepan Picek, Domagoj Jakobovic, Una-May O'Reilly:
CryptoBench: benchmarking evolutionary algorithms with cryptographic problems. GECCO (Companion) 2017: 1597-1604 - [c43]Stjepan Picek, Erik Hemberg, Domagoj Jakobovic, Una-May O'Reilly:
One-Class Classification of Low Volume DoS Attacks with Genetic Programming. GPTP 2017: 149-168 - [c42]Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, Nele Mentens:
Side-channel analysis and machine learning: A practical perspective. IJCNN 2017: 4095-4102 - [c41]Binh Tran, Stjepan Picek, Bing Xue:
Automatic Feature Construction for Network Intrusion Detection. SEAL 2017: 569-580 - [i7]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? IACR Cryptol. ePrint Arch. 2017: 261 (2017) - [i6]Stjepan Picek, Annelie Heuser, Sylvain Guilley:
Template Attack vs Bayes Classifier. IACR Cryptol. ePrint Arch. 2017: 531 (2017) - [i5]Luca Mariot, Stjepan Picek, Alberto Leporati, Domagoj Jakobovic:
Cellular Automata Based S-boxes. IACR Cryptol. ePrint Arch. 2017: 1055 (2017) - [i4]Stjepan Picek, Annelie Heuser, Alan Jovic, Axel Legay, Karlo Knezevic:
Profiled SCA with a New Twist: Semi-supervised Learning. IACR Cryptol. ePrint Arch. 2017: 1085 (2017) - [i3]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina, Axel Legay:
The secrets of profiling for side-channel analysis: feature selection matters. IACR Cryptol. ePrint Arch. 2017: 1110 (2017) - [i2]Claude Carlet, Stjepan Picek:
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. IACR Cryptol. ePrint Arch. 2017: 1179 (2017) - 2016
- [j3]Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Lejla Batina, Marko Cupic:
Cryptographic Boolean functions: One output, many design criteria. Appl. Soft Comput. 40: 635-653 (2016) - [j2]Stjepan Picek, Claude Carlet, Sylvain Guilley, Julian F. Miller, Domagoj Jakobovic:
Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography. Evol. Comput. 24(4): 667-694 (2016) - [j1]Stjepan Picek, Marko Cupic, Leon Rotim:
A New Cost Function for Evolution of S-Boxes. Evol. Comput. 24(4): 695-718 (2016) - [c40]Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens:
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. AFRICACRYPT 2016: 147-166 - [c39]Stjepan Picek, Bohan Yang, Vladimir Rozic, Jo Vliegen, Jori Winderickx, Thomas De Cnudde, Nele Mentens:
PRNGs for Masking Applications and Their Mapping to Evolvable Hardware. CARDIS 2016: 209-227 - [c38]Stjepan Picek, Roberto Santana, Domagoj Jakobovic:
Maximal nonlinearity in balanced boolean functions with even number of inputs, revisited. CEC 2016: 3222-3229 - [c37]Stjepan Picek, Carlos A. Coello Coello, Domagoj Jakobovic, Nele Mentens:
Evolutionary Algorithms for Finding Short Addition Chains: Going the Distance. EvoCOP 2016: 121-137 - [c36]Stjepan Picek, Domagoj Jakobovic:
Evolving Algebraic Constructions for Designing Bent Boolean Functions. GECCO 2016: 781-788 - [c35]Stjepan Picek:
Evolutionary Computation and Cryptology. GECCO (Companion) 2016: 883-909 - [c34]Stjepan Picek, Dominik Sisejkovic, Vladimir Rozic, Bohan Yang, Domagoj Jakobovic, Nele Mentens:
Evolving Cryptographic Pseudorandom Number Generators. PPSN 2016: 613-622 - [c33]Carola Doerr, Nicolas Bredèche, Enrique Alba, Thomas Bartz-Beielstein, Dimo Brockhoff, Benjamin Doerr, Gusz Eiben, Michael G. Epitropakis, Carlos M. Fonseca, Andreia P. Guerreiro, Evert Haasdijk, Jacqueline Heinerman, Julien Hubert, Per Kristian Lehre, Luigi Malagò, Juan Julián Merelo Guervós, Julian Francis Miller, Boris Naujoks, Pietro S. Oliveto, Stjepan Picek, Nelishia Pillay, Mike Preuss, Patricia Ryser-Welch, Giovanni Squillero, Jörg Stork, Dirk Sudholt, Alberto Paolo Tonda, L. Darrell Whitley, Martin Zaefferer:
Tutorials at PPSN 2016. PPSN 2016: 1012-1022 - [c32]Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens:
Side-Channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy? RFIDSec 2016: 91-104 - [c31]Stjepan Picek, Bohan Yang, Vladimir Rozic, Nele Mentens:
On the Construction of Hardware-Friendly 4\times 4 and 5\times 5 S-Boxes. SAC 2016: 161-179 - [c30]Stjepan Picek, Bohan Yang, Nele Mentens:
A Search Strategy to Optimize the Affine Variant Properties of S-Boxes. WAIFI 2016: 208-223 - [c29]Stjepan Picek:
Applications of Soft Computing in Cryptology. WISA 2016: 305-317 - 2015
- [b1]Stjepan Picek:
Applications of Evolutionary Computation to Cryptology ; Primjene evolucijskog računarstva u kriptologiji. University of Zagreb, Croatia, 2015 - [c28]Stjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic:
Fault Injection with a New Flavor: Memetic Algorithms Make a Difference. COSADE 2015: 159-173 - [c27]Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Elena Marchiori, Lejla Batina:
Evolutionary Methods for the Construction of Cryptographic Boolean Functions. EuroGP 2015: 192-204 - [c26]Simone A. Ludwig, Domagoj Jakobovic, Stjepan Picek:
Analyzing gene expression data: Fuzzy decision tree algorithm applied to the classification of cancer data. FUZZ-IEEE 2015: 1-8 - [c25]Stjepan Picek, Robert I. McKay, Roberto Santana, Tom Gedeon:
Fighting the Symmetries: The Structure of Cryptographic Boolean Function Spaces. GECCO 2015: 457-464 - [c24]Stjepan Picek, Claude Carlet, Domagoj Jakobovic, Julian F. Miller, Lejla Batina:
Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective. GECCO 2015: 1095-1102 - [c23]Stjepan Picek, Julian F. Miller, Domagoj Jakobovic, Lejla Batina:
Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes. GECCO (Companion) 2015: 1457-1458 - [c22]Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012 - [c21]Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek:
Improving DPA resistance of S-boxes: How far can we go? ISCAS 2015: 2013-2016 - [c20]Darko Hrestak, Stjepan Picek, Zeljko Rumenjak:
Improving the android smartphone security against various malware threats. MIPRO 2015: 1290-1295 - [c19]Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina:
Modified Transparency Order Property: Solution or Just Another Attempt. SPACE 2015: 210-227 - [c18]Stjepan Picek, Sylvain Guilley, Claude Carlet, Domagoj Jakobovic, Julian F. Miller:
Evolutionary Approach for Finding Correlation Immune Boolean Functions of Order t with Minimal Hamming Weight. TPNC 2015: 71-82 - 2014
- [c17]Stjepan Picek, Domagoj Jakobovic:
From fitness landscape to crossover operator choice. GECCO 2014: 815-822 - [c16]Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub:
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. CS2@HiPEAC 2014: 13-18 - [c15]Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic:
Optimality and beyond: The case of 4×4 S-boxes. HOST 2014: 80-83 - [c14]Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic:
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? INDOCRYPT 2014: 322-337 - [c13]Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic:
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. INDOCRYPT 2014: 374-390 - [c12]Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Rafael Boix Carpi:
Evolving genetic algorithms for fault injection attacks. MIPRO 2014: 1106-1111 - [c11]Darko Hrestak, Stjepan Picek:
Homomorphic encryption in the cloud. MIPRO 2014: 1400-1404 - [c10]Stjepan Picek, Lejla Batina, Domagoj Jakobovic:
Evolving DPA-Resistant Boolean Functions. PPSN 2014: 812-821 - [c9]Stjepan Picek, Elena Marchiori, Lejla Batina, Domagoj Jakobovic:
Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions. PPSN 2014: 822-831 - [c8]Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege, Marin Golub:
S-box, SET, Match: A Toolbox for S-box Analysis. WISTP 2014: 140-149 - [i1]Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic:
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? IACR Cryptol. ePrint Arch. 2014: 734 (2014) - 2013
- [c7]Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, Marin Golub:
Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection. CARDIS 2013: 236-252 - [c6]Stjepan Picek, Domagoj Jakobovic, Marin Golub:
On the recombination operator in the real-coded genetic algorithms. IEEE Congress on Evolutionary Computation 2013: 3103-3110 - [c5]Stjepan Picek, Domagoj Jakobovic, Marin Golub:
Evolving cryptographically sound boolean functions. GECCO (Companion) 2013: 191-192 - 2012
- [c4]Stjepan Picek, Marin Golub, Domagoj Jakobovic:
Influence of the crossover operator in the performance of the hybrid Taguchi GA. IEEE Congress on Evolutionary Computation 2012: 1-8 - [c3]Stjepan Picek, Marin Golub, Domagoj Jakobovic:
On the analysis of experimental results in evolutionary computation. MIPRO 2012: 1064-1069 - 2011
- [c2]Stjepan Picek, Marin Golub, Domagoj Jakobovic:
Evaluation of Crossover Operator Performance in Genetic Algorithms with Binary Representation. ICIC (3) 2011: 223-230 - [c1]Stjepan Picek, Marin Golub:
On evolutionary computation methods in cryptography. MIPRO 2011: 1496-1501
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint