Suivre
Stjepan Picek
Stjepan Picek
Radboud University, The Netherlands
Adresse e-mail validée de computer.org
Titre
Citée par
Citée par
Année
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
1622019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
1402019
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel
L Batina, S Bhasin, D Jap, S Picek
28th USENIX Security Symposium (USENIX Security 19), 515-532, 2019
138*2019
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
International Conference on Security, Privacy, and Applied Cryptography …, 2018
902018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
842017
Cryptographic Boolean functions: One output, many design criteria
S Picek, D Jakobovic, JF Miller, L Batina, M Cupic
Applied Soft Computing 40, 635-653, 2016
602016
Cellular automata based S-boxes
L Mariot, S Picek, A Leporati, D Jakobovic
Cryptography and Communications 11 (1), 41-62, 2019
532019
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
53*2017
Mind the portability: A warriors guide through realistic profiled side-channel analysis
S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan
NDSS 2020-Network and Distributed System Security Symposium, 1-14, 2020
522020
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
512014
A new cost function for evolution of s-boxes
S Picek, M Cupic, L Rotim
Evolutionary computation 24 (4), 695-718, 2016
492016
Evaluation of crossover operator performance in genetic algorithms with binary representation
S Picek, M Golub, D Jakobovic
International Conference on Intelligent Computing, 223-230, 2011
492011
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
462016
Comparison of a crossover operator in binary-coded genetic algorithms
S Picek, M Golub
WSEAS transactions on computers 9 (9), 1064-1073, 2010
462010
Glitch it if you can: parameter search strategies for successful fault injection
RB Carpi, S Picek, L Batina, F Menarini, D Jakobovic, M Golub
International Conference on Smart Card Research and Advanced Applications …, 2013
452013
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
IFIP International Workshop on Information Security Theory and Practice, 140-149, 2014
432014
On the recombination operator in the real-coded genetic algorithms
S Picek, D Jakobovic, M Golub
2013 IEEE Congress on Evolutionary Computation, 3103-3110, 2013
432013
A systematic evaluation of profiling through focused feature selection
S Picek, A Heuser, A Jovic, L Batina
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
41*2019
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box
S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
402014
Remove some noise: On pre-processing of side-channel measurements with autoencoders
L Wu, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 389-415, 2020
382020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20