If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where S. Picek is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output

A fast characterization method for semi-invasive fault injection attacks

Wu, L., Ribera, G., Beringuier-Boher, N. & Picek, S., 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer Open, p. 146-170 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

Open Access
File
  • 29 Downloads (Pure)

    An Evolutionary View on Reversible Shift-Invariant Transformations

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2020, Genetic Programming - 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Proceedings. Hu, T., Lourenço, N., Medvet, E. & Divina, F. (eds.). Springer Open, p. 118-134 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12101 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Lightweight Ciphers and their Side-channel Resilience

    Heuser, A., Picek, S., Guilley, S. & Mentens, N., 2020, In : IEEE Transactions on Computers. p. 1-16 16 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
  • 5 Citations (Scopus)
    51 Downloads (Pure)

    On the feasibility of using evolvable hardware for hardware Trojan detection and prevention

    Labafniya, M., Picek, S., Etemadi Borujeni, S. & Mentens, N., 1 Jun 2020, In : Applied Soft Computing Journal. 91, 11 p., 106247.

    Research output: Contribution to journalArticleScientificpeer-review

  • What Is Your MOVE: Modeling Adversarial Network Environments

    Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
  • 17 Downloads (Pure)