Follow
Stjepan Picek
Stjepan Picek
Radboud University, The Netherlands
Verified email at computer.org
Title
Cited by
Cited by
Year
Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis
J Kim, S Picek, A Heuser, S Bhasin, A Hanjalic
IACR Transactions on Cryptographic Hardware and Embedded Systems, 148-179, 2019
1822019
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel
L Batina, S Bhasin, D Jap, S Picek
28th USENIX Security Symposium (USENIX Security 19), 515-532, 2019
164*2019
The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations
S Picek, A Heuser, A Jovic, S Bhasin, F Regazzoni
IACR Transactions on Cryptographic Hardware and Embedded Systems 2019 (1), 1-29, 2019
1552019
On the performance of convolutional neural networks for side-channel analysis
S Picek, IP Samiotis, J Kim, A Heuser, S Bhasin, A Legay
International Conference on Security, Privacy, and Applied Cryptography …, 2018
962018
Side-channel analysis and machine learning: A practical perspective
S Picek, A Heuser, A Jovic, SA Ludwig, S Guilley, D Jakobovic, ...
2017 International Joint Conference on Neural Networks (IJCNN), 4095-4102, 2017
922017
Cryptographic Boolean functions: One output, many design criteria
S Picek, D Jakobovic, JF Miller, L Batina, M Cupic
Applied Soft Computing 40, 635-653, 2016
642016
Mind the portability: a warriors guide through realistic profiled side-channel analysis
S Bhasin, A Chattopadhyay, A Heuser, D Jap, S Picek, R Ranjan
NDSS 2020-Network and Distributed System Security Symposium, 1-14, 2020
592020
Template attack versus Bayes classifier
S Picek, A Heuser, S Guilley
Journal of Cryptographic Engineering 7 (4), 343-351, 2017
57*2017
Cellular automata based S-boxes
L Mariot, S Picek, A Leporati, D Jakobovic
Cryptography and Communications 11 (1), 41-62, 2019
552019
A new cost function for evolution of s-boxes
S Picek, M Cupic, L Rotim
Evolutionary computation 24 (4), 695-718, 2016
552016
Side-channel analysis of lightweight ciphers: Does lightweight equal easy?
A Heuser, S Picek, S Guilley, N Mentens
International Workshop on Radio Frequency Identification: Security and …, 2016
532016
Confused by confusion: Systematic evaluation of DPA resistance of various s-boxes
S Picek, K Papagiannopoulos, B Ege, L Batina, D Jakobovic
International Conference on Cryptology in India, 374-390, 2014
532014
Glitch it if you can: parameter search strategies for successful fault injection
RB Carpi, S Picek, L Batina, F Menarini, D Jakobovic, M Golub
International Conference on Smart Card Research and Advanced Applications …, 2013
502013
Comparison of a crossover operator in binary-coded genetic algorithms
S Picek, M Golub
WSEAS transactions on computers 9 (9), 1064-1073, 2010
492010
Evaluation of crossover operator performance in genetic algorithms with binary representation
S Picek, M Golub, D Jakobovic
International Conference on Intelligent Computing, 223-230, 2011
482011
A systematic evaluation of profiling through focused feature selection
S Picek, A Heuser, A Jovic, L Batina
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 27 (12 …, 2019
47*2019
S-box, SET, match: a toolbox for S-box analysis
S Picek, L Batina, D Jakobović, B Ege, M Golub
IFIP International Workshop on Information Security Theory and Practice, 140-149, 2014
472014
On the recombination operator in the real-coded genetic algorithms
S Picek, D Jakobovic, M Golub
2013 IEEE Congress on Evolutionary Computation, 3103-3110, 2013
462013
Reinforcement learning for hyperparameter tuning in deep learning-based side-channel analysis
J Rijsdijk, L Wu, G Perin, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 677-707, 2021
452021
Remove some noise: On pre-processing of side-channel measurements with autoencoders
L Wu, S Picek
IACR Transactions on Cryptographic Hardware and Embedded Systems, 389-415, 2020
452020
The system can't perform the operation now. Try again later.
Articles 1–20