A new cost function for evolution of s-boxes

S Picek, M Cupic, L Rotim - Evolutionary computation, 2016 - ieeexplore.ieee.org
Substitution Boxes (S-Boxes) play an important role in many modern-day cryptographic
algorithms, more commonly known as ciphers. Without carefully chosen S-Boxes, such …

The notion of transparency order, revisited

H Li, Y Zhou, J Ming, G Yang, C Jin - The Computer Journal, 2020 - academic.oup.com
We revisit the definition of transparency order (TO) and that of modified transparency order
(MTO) as well, which were proposed to measure the resistance of substitution boxes (S …

A highly efficient power model for correlation power analysis (cpa) of pipelined advanced encryption standard (aes)

JS Ng, J Chen, NA Kyaw, NKZ Lwin… - … on Circuits and …, 2020 - ieeexplore.ieee.org
We evaluate the vulnerability of a pipelined Advanced Encryption Standard (AES) against
Correlation Power Analysis (CPA) Side-Channel Attack (SCA). We identify that the registers …

[PDF][PDF] Applications of evolutionary computation to cryptology

S Picek - 2015 - repository.ubn.ru.nl
Untitled Page 1 Page 2 Page 3 Applications of Evolutionary Computation to Cryptology
Stjepan Picek Page 4 Copyright c Stjepan Picek, 2015 ISBN: 978-94-6295-238-6 IPA …

Combinatorial optimization in cryptography

K Knežević - 2017 40th International Convention on Information …, 2017 - ieeexplore.ieee.org
The known attacks on different cryptosystems lead to a number of criteria that the
implemented cryptographic algorithms (ciphers) must satisfy. The design of cryptographic …

Transparency order versus confusion coefficient: a case study of NIST lightweight cryptography S-Boxes

H Li, G Yang, J Ming, Y Zhou, C Jin - Cybersecurity, 2021 - Springer
Side-channel resistance is nowadays widely accepted as a crucial factor in deciding the
security assurance level of cryptographic implementations. In most cases, non-linear …

Evolutionary computation and machine learning in security

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …

Evolutionary computation and machine learning in cryptology

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2021 - dl.acm.org
6 Attacks on Ciphers-ML 7 Quantum Protocols-EC 8 Physically Unclonable Functions-EC,
ML 9 Hardware Trojans-EC, ML 10 Side-channel Analysis-ML, EC 11 Fault Injection-EC, ML …

Evolutionary computation and cryptology

S Picek - Proceedings of the 2016 on genetic and evolutionary …, 2016 - dl.acm.org
Evolutionary Computation (EC) has been used with great success on various real-world
problems. One domain abundant with numerous difficult problems is cryptology. Cryptology …

On the Evolution of Boomerang Uniformity in Cryptographic S-boxes

M Durasevic, D Jakobovic, L Mariot… - … Conference on the …, 2023 - Springer
S-boxes are an important primitive that help cryptographic algorithms to be resilient against
various attacks. The resilience against specific attacks can be connected with a certain …