Остановите войну!
for scientists:
default search action
Stjepan Picek
- > Home > Persons > Stjepan Picek
Publications
- 2024
- [c143]Asmita Adhikary, Abraham Basurto, Lejla Batina, Ileana Buhan, Joan Daemen, Silvia Mella, Nele Mentens, Stjepan Picek, Durga Lakshmi Ramachandran, Abolfazl Sajadi, Todor Stefanov, Dennis Vermoen, Nusa Zidaric:
PROACT - Physical Attack Resistance of Cryptographic Algorithms and Circuits with Reduced Time to Market. ARC 2024: 255-266 - 2023
- [j34]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. ACM Comput. Surv. 55(11): 227:1-227:35 (2023) - [j29]Lichao Wu, Léo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Label Correlation in Deep Learning-Based Side-Channel Analysis. IEEE Trans. Inf. Forensics Secur. 18: 3849-3861 (2023) - [e8]Jianying Zhou, Lejla Batina, Zengpeng Li, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Mohammad Ashiqur Rahman, Jun Shao, Masaki Shimaoka, Ezekiel O. Soremekun, Chunhua Su, Je Sen Teh, Aleksei Udovenko, Cong Wang, Leo Yu Zhang, Yury Zhauniarovich:
Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings. Lecture Notes in Computer Science 13907, Springer 2023, ISBN 978-3-031-41180-9 [contents] - [i87]Praveen Kulkarni, Vincent Verneuil, Stjepan Picek, Lejla Batina:
Order vs. Chaos: A Language Model Approach for Side-channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1615 (2023) - 2022
- [j28]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
SCA Strikes Back: Reverse-Engineering Neural Network Architectures Using Side Channels. IEEE Des. Test 39(4): 7-14 (2022) - [c117]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher. ACNS 2022: 809-829 - [c107]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake It Till You Make It: Data Augmentation Using Generative Adversarial Networks for All the Crypto You Need on Small Devices. CT-RSA 2022: 297-321 - [e7]Jianying Zhou, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Sudipta Chattopadhyay, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Jun Shao, Chunhua Su, Cong Wang, Yury Zhauniarovich, Saman A. Zonouz:
Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13285, Springer 2022, ISBN 978-3-031-16814-7 [contents] - [e6]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 11th International Conference, SPACE 2021, Kolkata, India, December 10-13, 2021, Proceedings. Lecture Notes in Computer Science 13162, Springer 2022, ISBN 978-3-030-95084-2 [contents] - [e5]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 12th International Conference, SPACE 2022, Jaipur, India, December 9-12, 2022, Proceedings. Lecture Notes in Computer Science 13783, Springer 2022, ISBN 978-3-031-22828-5 [contents] - [e4]Lejla Batina, Thomas Bäck, Ileana Buhan, Stjepan Picek:
Security and Artificial Intelligence - A Crossdisciplinary Approach. Lecture Notes in Computer Science 13049, Springer 2022, ISBN 978-3-030-98794-7 [contents] - [i69]Nicoleta-Norica Bacuieti, Lejla Batina, Stjepan Picek:
Deep neural networks aiding cryptanalysis: A case study of the Speck distinguisher. IACR Cryptol. ePrint Arch. 2022: 341 (2022) - [i65]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
AGE Is Not Just a Number: Label Distribution in Deep Learning-based Side-channel Analysis. IACR Cryptol. ePrint Arch. 2022: 1507 (2022) - 2021
- [j20]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(1): 343-372 (2021) - [p1]Lejla Batina, Milena Djukanovic, Annelie Heuser, Stjepan Picek:
It Started with Templates: The Future of Profiling in Side-Channel Analysis. Security of Ubiquitous Computing Systems 2021: 133-145 - [e3]Jianying Zhou, Chuadhry Mujeeb Ahmed, Lejla Batina, Sudipta Chattopadhyay, Olga Gadyatskaya, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Mihalis Maniatakos, Daisuke Mashima, Weizhi Meng, Stjepan Picek, Masaki Shimaoka, Chunhua Su, Cong Wang:
Applied Cryptography and Network Security Workshops - ACNS 2021 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, and SiMLA, Kamakura, Japan, June 21-24, 2021, Proceedings. Lecture Notes in Computer Science 12809, Springer 2021, ISBN 978-3-030-81644-5 [contents] - [i47]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-channel Analysis of Curve25519 with Machine Learning. IACR Cryptol. ePrint Arch. 2021: 944 (2021) - [i43]Naila Mukhtar, Lejla Batina, Stjepan Picek, Yinan Kong:
Fake it till you make it: Data Augmentation using Generative Adversarial Networks for all the crypto you need on small devices. IACR Cryptol. ePrint Arch. 2021: 991 (2021) - [i41]Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina:
SoK: Deep Learning-based Physical Side-channel Analysis. IACR Cryptol. ePrint Arch. 2021: 1092 (2021) - 2020
- [j16]Leo Weissbart, Lukasz Chmielewski, Stjepan Picek, Lejla Batina:
Systematic Side-Channel Analysis of Curve25519 with Machine Learning. J. Hardw. Syst. Secur. 4(4): 314-328 (2020) - [e2]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [e1]Lejla Batina, Stjepan Picek, Mainack Mondal:
Security, Privacy, and Applied Cryptography Engineering - 10th International Conference, SPACE 2020, Kolkata, India, December 17-21, 2020, Proceedings. Lecture Notes in Computer Science 12586, Springer 2020, ISBN 978-3-030-66625-5 [contents] - [i31]Guilherme Perin, Lukasz Chmielewski, Lejla Batina, Stjepan Picek:
Keep it Unsupervised: Horizontal Attacks Meet Deep Learning. IACR Cryptol. ePrint Arch. 2020: 891 (2020) - [i30]Lichao Wu, Leo Weissbart, Marina Krcek, Huimin Li, Guilherme Perin, Lejla Batina, Stjepan Picek:
Everything is Connected: From Model Learnability to Guessing Entropy. IACR Cryptol. ePrint Arch. 2020: 899 (2020) - 2019
- [j8]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina:
A Systematic Evaluation of Profiling Through Focused Feature Selection. IEEE Trans. Very Large Scale Integr. Syst. 27(12): 2802-2815 (2019) - [c75]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
Poster: Recovering the Input of Neural Networks via Single Shot Side-channel Attacks. CCS 2019: 2657-2659 - [c67]Leo Weissbart, Stjepan Picek, Lejla Batina:
One Trace Is All It Takes: Machine Learning-Based Side-Channel Attack on EdDSA. SPACE 2019: 86-105 - [c66]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI NN: Reverse Engineering of Neural Network Architectures Through Electromagnetic Side Channel. USENIX Security Symposium 2019: 515-532 - [i23]Leo Weissbart, Stjepan Picek, Lejla Batina:
One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA. IACR Cryptol. ePrint Arch. 2019: 358 (2019) - [i18]Leo Weissbart, Stjepan Picek, Lejla Batina:
On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis. IACR Cryptol. ePrint Arch. 2019: 1476 (2019) - 2018
- [c60]Antun Maldini, Niels Samwel, Stjepan Picek, Lejla Batina:
Genetic Algorithm-Based Electromagnetic Fault Injection. FDTC 2018: 35-42 - [i15]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. CoRR abs/1810.09076 (2018) - [i11]Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek:
CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information. IACR Cryptol. ePrint Arch. 2018: 477 (2018) - 2017
- [i3]Stjepan Picek, Annelie Heuser, Alan Jovic, Lejla Batina, Axel Legay:
The secrets of profiling for side-channel analysis: feature selection matters. IACR Cryptol. ePrint Arch. 2017: 1110 (2017) - 2016
- [j3]Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Lejla Batina, Marko Cupic:
Cryptographic Boolean functions: One output, many design criteria. Appl. Soft Comput. 40: 635-653 (2016) - [c40]Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, Nele Mentens:
Extreme Pipelining Towards the Best Area-Performance Trade-Off in Hardware. AFRICACRYPT 2016: 147-166 - 2015
- [c28]Stjepan Picek, Lejla Batina, Pieter Buzing, Domagoj Jakobovic:
Fault Injection with a New Flavor: Memetic Algorithms Make a Difference. COSADE 2015: 159-173 - [c27]Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Elena Marchiori, Lejla Batina:
Evolutionary Methods for the Construction of Cryptographic Boolean Functions. EuroGP 2015: 192-204 - [c24]Stjepan Picek, Claude Carlet, Domagoj Jakobovic, Julian F. Miller, Lejla Batina:
Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective. GECCO 2015: 1095-1102 - [c23]Stjepan Picek, Julian F. Miller, Domagoj Jakobovic, Lejla Batina:
Cartesian Genetic Programming Approach for Generating Substitution Boxes of Different Sizes. GECCO (Companion) 2015: 1457-1458 - [c22]Ricardo Chaves, Giorgio Di Natale, Lejla Batina, Shivam Bhasin, Baris Ege, Apostolos P. Fournaris, Nele Mentens, Stjepan Picek, Francesco Regazzoni, Vladimir Rozic, Nicolas Sklavos, Bohan Yang:
Challenges in designing trustworthy cryptographic co-processors. ISCAS 2015: 2009-2012 - [c21]Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Stjepan Picek:
Improving DPA resistance of S-boxes: How far can we go? ISCAS 2015: 2013-2016 - [c19]Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Lejla Batina:
Modified Transparency Order Property: Solution or Just Another Attempt. SPACE 2015: 210-227 - 2014
- [c16]Stjepan Picek, Baris Ege, Lejla Batina, Domagoj Jakobovic, Lukasz Chmielewski, Marin Golub:
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box. CS2@HiPEAC 2014: 13-18 - [c15]Stjepan Picek, Baris Ege, Kostas Papagiannopoulos, Lejla Batina, Domagoj Jakobovic:
Optimality and beyond: The case of 4×4 S-boxes. HOST 2014: 80-83 - [c14]Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic:
S-box Pipelining Using Genetic Algorithms for High-Throughput AES Implementations: How Fast Can We Go? INDOCRYPT 2014: 322-337 - [c13]Stjepan Picek, Kostas Papagiannopoulos, Baris Ege, Lejla Batina, Domagoj Jakobovic:
Confused by Confusion: Systematic Evaluation of DPA Resistance of Various S-boxes. INDOCRYPT 2014: 374-390 - [c12]Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Rafael Boix Carpi:
Evolving genetic algorithms for fault injection attacks. MIPRO 2014: 1106-1111 - [c10]Stjepan Picek, Lejla Batina, Domagoj Jakobovic:
Evolving DPA-Resistant Boolean Functions. PPSN 2014: 812-821 - [c9]Stjepan Picek, Elena Marchiori, Lejla Batina, Domagoj Jakobovic:
Combining Evolutionary Computation and Algebraic Constructions to Find Cryptography-Relevant Boolean Functions. PPSN 2014: 822-831 - [c8]Stjepan Picek, Lejla Batina, Domagoj Jakobovic, Baris Ege, Marin Golub:
S-box, SET, Match: A Toolbox for S-box Analysis. WISTP 2014: 140-149 - [i1]Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, Dominik Sisejkovic:
S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go? IACR Cryptol. ePrint Arch. 2014: 734 (2014) - 2013
- [c7]Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, Marin Golub:
Glitch It If You Can: Parameter Search Strategies for Successful Fault Injection. CARDIS 2013: 236-252
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint