Follow
Stjepan Picek
Stjepan Picek
Radboud University, The Netherlands
Verified email at computer.org
Title
Cited by
Cited by
Year
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
1892019
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel
L Batina, S Bhasin, D Jap, S Picek
28th USENIX Security Symposium (USENIX Security 19), 515-532, 2019
178*2019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
1672019
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
International Conference on Security, Privacy, and Applied Cryptography …, 2018
992018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
952017
Cryptographic Boolean functions: One output, many design criteria
S Picek, D Jakobovic, JF Miller, L Batina, M Cupic
Applied Soft Computing 40, 635-653, 2016
672016
Mind the portability: a warriors guide through realistic profiled side-channel analysis
S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan
NDSS 2020-Network and Distributed System Security Symposium, 1-14, 2020
622020
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
58*2017
Cellular automata based S-boxes
L Mariot, S Picek, A Leporati, D Jakobovic
Cryptography and Communications 11 (1), 41-62, 2019
562019
A new cost function for evolution of s-boxes
S Picek, M Cupic, L Rotim
Evolutionary computation 24 (4), 695-718, 2016
552016
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
532016
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
532014
Glitch it if you can: parameter search strategies for successful fault injection
RB Carpi, S Picek, L Batina, F Menarini, D Jakobovic, M Golub
International Conference on Smart Card Research and Advanced Applications …, 2013
522013
Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis
J Rijsdijk, L Wu, G Perin, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 677-707, 2021
512021
Remove some noise: On pre-processing of side-channel measurements with autoencoders
L Wu, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 389-415, 2020
492020
A systematic evaluation of profiling through focused feature selection
S Picek, A Heuser, A Jovic, L Batina
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
49*2019
Comparison of a crossover operator in binary-coded genetic algorithms
S Picek, M Golub
WSEAS transactions on computers 9 (9), 1064-1073, 2010
492010
Evaluation of crossover operator performance in genetic algorithms with binary representation
S Picek, M Golub, D Jakobovic
International Conference on Intelligent Computing, 223-230, 2011
482011
Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis
G Perin, Ł Chmielewski, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 337-364, 2020
472020
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
IFIP International Workshop on Information Security Theory and Practice, 140-149, 2014
472014
The system can't perform the operation now. Try again later.
Articles 1–20