Stjepan Picek
Stjepan Picek
Delft University of Technology
Verified email at computer.org
Title
Cited by
Cited by
Year
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
1202019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
1112019
{CSI}{NN}: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel
L Batina, S Bhasin, D Jap, S Picek
28th {USENIX} Security Symposium ({USENIX} Security 19), 515-532, 2019
98*2019
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
International Conference on Security, Privacy, and Applied Cryptography …, 2018
77*2018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
762017
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
512014
Cryptographic Boolean functions: One output, many design criteria
S Picek, D Jakobovic, JF Miller, L Batina, M Cupic
Applied Soft Computing 40, 635-653, 2016
502016
Evaluation of crossover operator performance in genetic algorithms with binary representation
S Picek, M Golub, D Jakobovic
International Conference on Intelligent Computing, 223-230, 2011
452011
Comparison of a crossover operator in binary-coded genetic algorithms
S Picek, M Golub
WSEAS transactions on computers 9 (9), 1064-1073, 2010
452010
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
43*2017
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
422016
Cellular automata based S-boxes
L Mariot, S Picek, A Leporati, D Jakobovic
Cryptography and Communications 11 (1), 41-62, 2019
412019
A new cost function for evolution of s-boxes
S Picek, M Cupic, L Rotim
Evolutionary computation 24 (4), 695-718, 2016
412016
Glitch it if you can: parameter search strategies for successful fault injection
RB Carpi, S Picek, L Batina, F Menarini, D Jakobovic, M Golub
International Conference on Smart Card Research and Advanced Applications …, 2013
392013
On the recombination operator in the real-coded genetic algorithms
S Picek, D Jakobovic, M Golub
2013 IEEE Congress on Evolutionary Computation, 3103-3110, 2013
382013
On using genetic algorithms for intrinsic side-channel resistance: the case of AES s-box
S Picek, B Ege, L Batina, D Jakobovic, Ł Chmielewski, M Golub
Proceedings of the First Workshop on Cryptography and Security in Computing …, 2014
372014
A systematic evaluation of profiling through focused feature selection
S Picek, A Heuser, A Jovic, L Batina
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
35*2019
Homomorphic encryption in the cloud
D Hrestak, S Picek
2014 37th International Convention on Information and Communication …, 2014
352014
Optimality and beyond: The case of 4× 4 S-boxes
S Picek, B Ege, K Papagiannopoulos, L Batina, D Jakobović
2014 IEEE International Symposium on Hardware-Oriented Security and Trust …, 2014
312014
Design of S-boxes defined with cellular automata rules
S Picek, L Mariot, B Yang, D Jakobovic, N Mentens
Proceedings of the Computing Frontiers Conference, 409-414, 2017
302017
The system can't perform the operation now. Try again later.
Articles 1–20