Follow
Stjepan Picek
Stjepan Picek
Associate professor, Radboud University, The Netherlands
Verified email at computer.org
Title
Cited by
Cited by
Year
CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel
L Batina, S Bhasin, D Jap, S Picek
[Sl]: USENIX, 2019
214*2019
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
2102019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
1902019
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018
1082018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
1042017
Cryptographic Boolean functions: One output, many design criteria
S Picek, D Jakobovic, JF Miller, L Batina, M Cupic
Applied Soft Computing 40, 635-653, 2016
712016
Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis
J Rijsdijk, L Wu, G Perin, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 677-707, 2021
682021
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
68*2017
Mind the portability: A warriors guide through realistic profiled side-channel analysis
S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan
NDSS 2020-Network and Distributed System Security Symposium, 1-14, 2020
662020
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
662014
Cellular automata based S-boxes
L Mariot, S Picek, A Leporati, D Jakobovic
Cryptography and Communications 11 (1), 41-62, 2019
622019
Remove some noise: On pre-processing of side-channel measurements with autoencoders
L Wu, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 389-415, 2020
602020
Strength in numbers: Improving generalization with ensembles in machine learning-based profiled side-channel analysis
G Perin, Ł Chmielewski, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 337-364, 2020
592020
A new cost function for evolution of s-boxes
S Picek, M Cupic, L Rotim
Evolutionary computation 24 (4), 695-718, 2016
592016
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
Information Security Theory and Practice. Securing the Internet of Things …, 2014
572014
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
Radio Frequency Identification and IoT Security: 12th International Workshop …, 2017
552017
Glitch it if you can: parameter search strategies for successful fault injection
RB Carpi, S Picek, L Batina, F Menarini, D Jakobovic, M Golub
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
542014
Design of S-boxes defined with cellular automata rules
S Picek, L Mariot, B Yang, D Jakobovic, N Mentens
Proceedings of the Computing Frontiers Conference, 409-414, 2017
532017
Predictive and generative machine learning models for photonic crystals
T Christensen, C Loh, S Picek, D Jakobović, L Jing, S Fisher, V Ceperic, ...
Nanophotonics 9 (13), 4183-4192, 2020
512020
Comparison of a crossover operator in binary-coded genetic algorithms
S Picek, M Golub
WSEAS transactions on computers 9 (9), 1064-1073, 2010
512010
The system can't perform the operation now. Try again later.
Articles 1–20