Stjepan Picek

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On two open problems on the normality of bent functions
Discrete Applied Mathematics
2024-12-04Paper
Towards private deep learning-based side-channel analysis using homomorphic encryption. Opportunities and limitations2024-10-31Paper
Not so difficult in the end: breaking the lookup table-based affine masking scheme2024-10-16Paper
Evolutionary strategies for the design of binary linear codes
Evolutionary Computation in Combinatorial Optimization
2024-01-12Paper
A survey of metaheuristic algorithms for the design of cryptographic Boolean functions
Cryptography and Communications
2023-12-14Paper
On the evaluation of deep learning-based side-channel analysis
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
Focus is key to success: a focal loss function for deep learning-based side-channel analysis
Constructive Side-Channel Analysis and Secure Design
2023-12-12Paper
On the performance of convolutional neural networks for side-channel analysis
Security, Privacy, and Applied Cryptography Engineering
2023-11-01Paper
The design of (almost) disjunct matrices by evolutionary algorithms
Theory and Practice of Natural Computing
2023-10-16Paper
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
Advances in Mathematics of Communications
2023-09-12Paper
Bent functions in the partial spread class generated by linear recurring sequences
Designs, Codes and Cryptography
2023-01-18Paper
Kilroy was here: the first step towards explainability of neural networks in profiled side-channel analysis2022-12-16Paper
Fake it till you make it: data augmentation using generative adversarial networks for all the crypto you need on small devices2022-07-06Paper
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience2022-07-01Paper
Learning when to stop: a mutual information approach to prevent overfitting in profiled side-channel analysis2022-06-17Paper
On the influence of optimizers in deep learning-based side-channel analysis2022-03-25Paper
Bent Functions in the Partial Spread Class Generated by Linear Recurring Sequences
(available as arXiv preprint)
2021-12-16Paper
Lightweight Ciphers and Their Side-Channel Resilience
IEEE Transactions on Computers
2020-10-02Paper
A fast characterization method for semi-invasive fault injection attacks2020-08-05Paper
Cellular automata based S-boxes
Cryptography and Communications
2019-01-08Paper
On the construction of hardware-friendly \(4\times4\) and \(5\times5\) S-boxes2018-02-16Paper
Climbing down the hierarchy: hierarchical classification for machine learning side-channel attacks
Progress in Cryptology - AFRICACRYPT 2017
2017-08-04Paper
A Search Strategy to Optimize the Affine Variant Properties of S-Boxes
Arithmetic of Finite Fields
2017-06-13Paper
Extreme pipelining towards the best area-performance trade-off in hardware
Progress in Cryptology – AFRICACRYPT 2016
2016-06-22Paper
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
S-box pipelining using genetic algorithms for high-throughput AES implementations: how fast can we go?
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper


Research outcomes over time


This page was built for person: Stjepan Picek