If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber

    Li, H., Mentens, N. & Picek, S., 2022, Proceedings of the 59th ACM/IEEE Design Automation Conference, DAC 2022. Institute of Electrical and Electronics Engineers (IEEE), p. 733-738 6 p. (Proceedings - Design Automation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Downloads (Pure)
  • A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage

    Arora, V., Buhan, I., Perin, G. & Picek, S., 2022, Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Springer Science and Business Media Deutschland GmbH, Vol. 13173. p. 80-96 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

    Koffas, S., Xu, J., Conti, M. & Picek, S., 2022, WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning. Association for Computing Machinery (ACM), p. 57-62 6 p. (WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    9 Downloads (Pure)
  • Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher

    Băcuieți, N., Batina, L. & Picek, S., 2022, Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings. Ateniese, G. & Venturi, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 809-829 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13269 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Dynamic Backdoors with Global Average Pooling

    Koffas, S., Picek, S. & Conti, M., 2022, Proceedings of the 2022 IEEE 4th International Conference on Artificial Intelligence Circuits and Systems (AICAS). Danvers: IEEE , p. 320-323 4 p. 9869920

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices

    Mukhtar, N., Batina, L., Picek, S. & Kong, Y., 2022, Topics in Cryptology - CT-RSA 2022 : Cryptographers’ Track at the RSA Conference, 2022, Proceedings. Galbraith, S. D. (ed.). Cham: Springer, p. 297-321 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13161 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Focus is Key to Success: A Focal Loss Function for Deep Learning-Based Side-Channel Analysis

    Kerkhof, M., Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer Science and Business Media Deutschland GmbH, Vol. 13211. p. 29-48 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • On the Evaluation of Deep Learning-Based Side-Channel Analysis

    Wu, L., Perin, G. & Picek, S., 2022, Constructive Side-Channel Analysis and Secure Design - 13th International Workshop, COSADE 2022, Proceedings. Balasch, J. & O’Flynn, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 49-71 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13211 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Profiled Side-Channel Analysis in the Efficient Attacker Framework

    Picek, S., Heuser, A., Perin, G. & Guilley, S., 2022, Smart Card Research and Advanced Applications : 20th International Conference, CARDIS 2021, Revised Selected Papers. Grosso, V. & Pöppelmann, T. (eds.). Cham: Springer, Vol. 13173. p. 44-63 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13173 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • 2021

    CoInGP: Convolutional inpainting with genetic programming

    Jakobovic, D., Manzoni, L., Mariot, L., Picek, S. & Castelli, M., 2021, GECCO 2021 : Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Chicano, F. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 795-803 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Evolutionary algorithms-assisted construction of cryptographic boolean functions

    Carlet, C., Jakobovic, D. & Picek, S., 2021, GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference. Association for Computing Machinery (ACM), p. 565-573 9 p. (GECCO 2021 - Proceedings of the 2021 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    19 Downloads (Pure)
  • Explainability-based Backdoor Attacks against Graph Neural Networks

    Xu, J., Xue, M. & Picek, S., 2021, WiseML 2021 : Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning. New York: Association for Computing Machinery (ACM), p. 31-36 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    39 Downloads (Pure)
  • Kilroy Was Here: The First Step Towards Explainability of Neural Networks in Profiled Side-Channel Analysis

    Valk, D., Picek, S. & Bhasin, S., 2021, Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, COSADE 2020, Revised Selected Papers. Bertoni, G. M. & Regazzoni, F. (eds.). Springer, Vol. 12244. p. 175-199 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12244 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • Learning When to Stop: A Mutual Information Approach to Prevent Overfitting in Profiled Side-Channel Analysis

    Perin, G., Buhan, I. & Picek, S., 2021, Constructive Side-Channel Analysis and Secure Design - 12th International Workshop, COSADE 2021, Proceedings. Bhasin, S. & De Santis, F. (eds.). Springer, p. 53-81 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12910 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • On the genotype compression and expansion for evolutionary algorithms in the continuous domain

    Planinic, L., Djurasevic, M., Mariot, L., Jakobovic, D., Picek, S. & Coello Coello, C., 2021, GECCO 2021 Companion : Proceedings of the 2021 Genetic and Evolutionary Computation Conference Companion. Chicano, E. & Krawiec, K. (eds.). New York: Association for Computing Machinery (ACM), p. 1208-1216 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • On the Importance of Initial Solutions Selection in Fault Injection

    Krcek, M., Fronte, D. & Picek, S., 2021, 2021 Workshop on Fault Detection and Tolerance in Cryptography (FDTC): Proceedings. O’Dell, M. (ed.). Piscataway: IEEE , p. 1-12 12 p. 9565588

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    30 Downloads (Pure)
  • On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis

    Perin, G. & Picek, S., 2021, Selected Areas in Cryptography : 27th International Conference, 2020, Revised Selected Papers. Dunkelman, O., Jacobson, Jr., M. J. & O’Flynn, C. (eds.). Cham: Springer, Vol. 12804. p. 615-636 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12804).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • ReproducedPapers.org: Openly Teaching and Structuring Machine Learning Reproducibility

    Yildiz, B., Hung, H., Krijthe, J. H., Liem, C. C. S., Loog, M., Migut, G., Oliehoek, F. A., Panichella, A., Pawełczak, P., Picek, S., de Weerdt, M. & van Gemert, J., 2021, Reproducible Research in Pattern Recognition - 3rd International Workshop, RRPR 2021, Revised Selected Papers. Kerautret, B., Colom, M., Krähenbühl, A., Lopresti, D., Monasse, P. & Talbot, H. (eds.). Springer, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12636 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    17 Downloads (Pure)
  • 2020

    A fast characterization method for semi-invasive fault injection attacks

    Wu, L., Ribera, G., Beringuier-Boher, N. & Picek, S., 2020, Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer Open, p. 146-170 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Citations (Scopus)
    108 Downloads (Pure)
  • An Evolutionary View on Reversible Shift-Invariant Transformations

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2020, Genetic Programming - 23rd European Conference, EuroGP 2020, Held as Part of EvoStar 2020, Proceedings. Hu, T., Lourenço, N., Medvet, E. & Divina, F. (eds.). Springer Open, p. 118-134 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12101 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • A search for additional structure: The case of cryptographic s-boxes

    Carlet, C., Djurasevic, M., Jakobovic, D. & Picek, S., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 343-356 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    4 Downloads (Pure)
  • Big enough to care not enough to scare! crawling to attack recommender systems

    Aiolli, F., Conti, M., Picek, S. & Polato, M., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer, p. 165-184 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Evolutionary computation and machine learning in cryptology

    Picek, S. & Jakobovic, D., 2020, GECCO 2020 Companion : Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion. New York: Association for Computing Machinery (ACM), p. 1147-1173 27 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    111 Downloads (Pure)
  • Fitness landscape analysis of dimensionally-aware genetic programming featuring feynman equations

    Ðurasević, M., Jakobovic, D., Martins, M. S. R., Picek, S. & Wagner, M., 2020, Parallel Problem Solving from Nature – PPSN XVI. Bäck, T., Preuss, M., Deutz, A., Emmerich, M., Wang, H., Doerr, C. & Trautmann, H. (eds.). Part II ed. Cham: Springer, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12270 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    6 Downloads (Pure)
  • Learning From A Big Brother: Mimicking Neural Networks in Profiled Side-channel Analysis

    van der Valk, D., Krcek, M., Picek, S. & Bhasin, S., 2020, 2020 57th ACM/IEEE Design Automation Conference, DAC 2020. Piscataway: IEEE , p. 1-6 6 p. 9218520. (Proceedings - Design Automation Conference; vol. 2020-July).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • One property to rule them all? On the limits of trade-offs for S-boxes

    Djurasevic, M., Jakobovic, D. & Picek, S., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 1064-1072 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    24 Downloads (Pure)
  • Towards an evolutionary-based approach for natural language processing

    Manzoni, L., Jakobovic, D., Mariot, L., Picek, S. & Castelli, M., 2020, GECCO 2020 : Proceedings of the 2020 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 985-993 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    18 Downloads (Pure)
  • What Is Your MOVE: Modeling Adversarial Network Environments

    Knezevic, K., Picek, S., Jakobovic, D. & Hernandez-Castro, J., 2020, Applications of Evolutionary Computation : 23rd European Conference, EvoApplications 2020, Held as Part of EvoStar 2020, Proceedings. Castillo, P. A., Jiménez Laredo, J. L. & Fernández de Vega, F. (eds.). Cham: Springer, p. 260-275 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12104 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    51 Downloads (Pure)
  • 2019

    A characterisation of S-box fitness landscapes in cryptography

    Jakobovic, D., Picek, S., Martins, M. S. R. & Wagner, M., 2019, GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference: Proceedings of the 2019 Genetic and Evolutionary Computation Conference. New York: Association for Computing Machinery (ACM), p. 285-293 9 p. (GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • C3PO: Cipher Construction with Cartesian genetic PrOgramming

    Picek, S., Knezevic, K., Jakobovic, D. & Derek, A., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 1625-1633 9 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Challenges in deep learning-based profiled side-channel analysis

    Picek, S., 1 Jan 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, Vol. 11947. p. 9-12 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • CSI NN: Reverse engineering of neural network architectures through electromagnetic side channel

    Batina, L., Jap, D., Bhasin, S. & Picek, S., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 515-532 18 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Open Access
    File
    55 Downloads (Pure)
  • Evolutionary algorithms for the design of quantum protocols

    Krawec, W., Picek, S. & Jakobovic, D., 2019, Applications of Evolutionary Computation: 22nd International Conference, EvoApplications 2019, Held as Part of EvoStar 2019. Kaufmann, P. & Castillo, P. A. (eds.). Cham: Springer, p. 220-236 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11454 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Hyper-bent Boolean Functions and Evolutionary Algorithms

    Mariot, L., Jakobovic, D., Leporati, A. & Picek, S., 2019, Genetic Programming : 22nd European Conference, EuroGP 2019, Held as Part of EvoStar 2019, Proceedings. Sekanina, L., Hu, T., Richter, H., García-Sánchez, P. & Lourenço, N. (eds.). Cham: Springer, p. 262-277 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11451 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Improving Side-Channel Analysis Through Semi-Supervised Learning

    Picek, S., Heuser, A., Jovic, A., Knezevic, K. & Richmond, T., 2019, Smart Card Research and Advanced Applications : 17th International Conference, CARDIS 2018, Revised Selected Papers. Bilgin, B. & Fischer, J-B. (eds.). Cham: Springer, Vol. 11389. p. 35-50 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11389).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    2 Citations (Scopus)
  • One trace is all it takes: machine learning-based side-channel attack on EDDSA

    Weissbart, L., Picek, S. & Batina, L., 2019, Security, Privacy, and Applied Cryptography Engineering - 9th International Conference, SPACE 2019, Proceedings. Bhasin, S., Mendelson, A. & Nandi, M. (eds.). Springer, p. 86-105 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11947 LNCS).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    13 Citations (Scopus)
  • On the design of S-box constructions with genetic programming

    Picek, S. & Jakobovic, D., 2019, GECCO'19 : Proceedings of the 2019 Genetic and Evolutionary Computation Conference Companion. López-Ibáñez, M. (ed.). New York: Association for Computing Machinery (ACM), p. 395-396 2 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    6 Citations (Scopus)
  • Poster: Recovering the input of neural networks via single shot side-channel attacks

    Batina, L., Bhasin, S., Jap, D. & Picek, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2657-2659 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Poster: When adversary becomes the guardian - Towards side-channel security with adversarial attacks

    Picek, S., Jap, D. & Bhasin, S., 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery (ACM), p. 2673-2675 3 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • 2018

    A Search for Differentially-6 Uniform (n, n-2) Functions

    Picek, S., Knezevic, K., Jakobovic, D. & Carlet, C., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE , p. 1-7 7 p. 8477646

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • Evolutionary search of binary orthogonal arrays

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 1 ed. Cham: Springer, p. 121-133 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11101 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    9 Citations (Scopus)
  • Evolving Bent Quaternary Functions

    Picek, S., Knezevic, K., Mariot, L., Jakobovic, D. & Leporati, A., 2018, 2018 IEEE Congress on Evolutionary Computation (CEC): Proceedings. Piscataway, NJ: IEEE , p. 1-8 8 p. 8477677

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Genetic Algorithm-Based Electromagnetic Fault Injection

    Maldini, A., Samwel, N., Picek, S. & Batina, L., 2018, 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography FDTC : Proceedings. Guerrero, J. E. (ed.). Piscataway, NJ: IEEE , p. 35-42 8 p. 8573932

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    8 Citations (Scopus)
  • Higher order side-channel attack resilient S-boxes

    Lerman, L., Veshchikov, N., Picek, S. & Markowitch, O., 2018, 2018 ACM International Conference on Computing Frontiers, CF 2018 - Proceedings. Kaeli, D. R. & Pericàs, M. (eds.). New York: Association for Computing Machinery (ACM), p. 336-341 6 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • On Comparing Side-channel Properties of AES and ChaCha20 on Microcontrollers

    Najm, Z., Jap, D., Jungk, B., Picek, S. & Bhasin, S., 2018, 2018 IEEE Asia Pacific Conference on Circuits and Systems (APCCAS). Piscataway, NJ: IEEE , p. 552-555 4 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    4 Citations (Scopus)
  • On the Performance of Convolutional Neural Networks for Side-Channel Analysis

    Picek, S., Samiotis, I. P., Kim, J., Heuser, A., Bhasin, S. & Legay, A., 2018, Security, Privacy, and Applied Cryptography Engineering: 8th International Conference, SPACE 2018, Kanpur, India, December 15-19, 2018, Proceedings. Chattopadhyay, A., Rebeiro, C. & Yarom, Y. (eds.). Cham: Springer, p. 157-176 20 p. (Lecture Notes in Computer Science; vol. 11348).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    45 Citations (Scopus)
  • The Design of (Almost) Disjunct Matrices by Evolutionary Algorithms

    Knezevic, K., Picek, S., Mariot, L., Jakobovic, D. & Leporati, A., 2018, Theory and Practice of Natural Computing: 7th International Conference, TPNC 2018, Dublin, Ireland, December 12–14, 2018, Proceedings. Fagan, D., Martín-Vide, C., O'Neill, M. & Vega-Rodríguez, M. A. (eds.). Cham: Springer, p. 152-163 12 p. (Lecture Notes in Computer Science ; vol. 11324).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • Tutorials at PPSN 2018

    Lobo Pappa, G., Emmerich, M. T. M., Bazzan, A., Browne, W., Deb, K., Doerr, C., Ðurasević, M., Epitropakis, M. G., Haraldsson, S. O., Picek, S. & More Authors, 2018, Parallel Problem Solving from Nature – PPSN XV - 15th International Conference, 2018, Proceedings. Auger, A., Fonseca, C. M., Lourenço, N., Machado, P., Paquete, L. & Whitley, D. (eds.). 2 ed. Cham: Springer, p. 477-489 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11102).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

  • 2017

    Automatic Feature Construction for Network Intrusion Detection

    Tran, B., Picek, S. & Xue, B., 2017, Simulated Evolution and Learning : 11th International Conference SEAL 2017 Proceedings. Shi, Y., Tan, K. C., Zhang, M., Tang, K., Li, X., Zhang, Q., Tan, Y., Middendorf, M. & Jin, Y. (eds.). Cham: Springer, p. 569-580 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10593 ).

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Evolutionary algorithms for the design of orthogonal Latin squares based on cellular automata

    Mariot, L., Picek, S., Jakobovic, D. & Leporati, A., 2017, GECCO'17 Proceedings of the Genetic and Evolutionary Computation Conference. New York, NY: Association for Computing Machinery (ACM), p. 306-313 8 p.

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    14 Citations (Scopus)