Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Picek, Stjepan
add a person with the name Picek, Stjepan
 

Other publications of authors with the same name

Cryptographic Boolean functions: One output, many design criteria., , , , and . Appl. Soft Comput., (2016)Improving the android smartphone security against various malware threats., , and . MIPRO, page 1290-1295. IEEE, (2015)Evolving genetic algorithms for fault injection attacks., , , and . MIPRO, page 1106-1111. IEEE, (2014)Evolving DPA-Resistant Boolean Functions., , and . PPSN, volume 8672 of Lecture Notes in Computer Science, page 812-821. Springer, (2014)A Search for Differentially-6 Uniform (n, n-2) Functions., , , and . CEC, page 1-7. IEEE, (2018)Fault Injection with a New Flavor: Memetic Algorithms Make a Difference., , , and . COSADE, volume 9064 of Lecture Notes in Computer Science, page 159-173. Springer, (2015)Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO., , , , , , , , , and 3 other author(s). CoRR, (2018)The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 209-237 (2019)Template Attack vs Bayes Classifier., , and . IACR Cryptology ePrint Archive, (2017)The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations., , , , and . IACR Cryptology ePrint Archive, (2018)