27 results on '"Picek, Stjepan"'
Search Results
2. No (good) loss no gain: systematic evaluation of loss functions in deep learning-based side-channel analysis
3. Bent functions in the partial spread class generated by linear recurring sequences
4. Evolutionary algorithms for designing reversible cellular automata
5. Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks.
6. Toward more efficient heuristic construction of Boolean functions
7. Systematic Side-Channel Analysis of Curve25519 with Machine Learning
8. On the feasibility of using evolvable hardware for hardware Trojan detection and prevention
9. Assessing the Ability of Genetic Programming for Feature Selection in Constructing Dispatching Rules for Unrelated Machine Environments.
10. On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials.
11. Cellular automata based S-boxes
12. Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties
13. SoK: Deep Learning-based Physical Side-channel Analysis.
14. Finding short and implementation-friendly addition chains with evolutionary algorithms
15. Template attack versus Bayes classifier
16. Cryptographic Boolean functions: One output, many design criteria
17. Resolving the Doubts: On the Construction and Use of ResNets for Side-Channel Analysis.
18. The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA.
19. On the feasibility of crawling-based attacks against recommender systems1.
20. Guest Editorial: Trustworthy AI.
21. Predictive and generative machine learning models for photonic crystals.
22. Lightweight Ciphers and Their Side-Channel Resilience.
23. The Fifth International Students' Olympiad in cryptography—NSUCRYPTO: Problems and their solutions.
24. A Systematic Evaluation of Profiling Through Focused Feature Selection.
25. A New Cost Function for Evolution of S-Boxes.
26. Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography.
27. On the feasibility of crawling-based attacks against recommender systems1.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.