skip to main content
10.1145/3377929.3389886acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
tutorial
Open Access

Evolutionary computation and machine learning in cryptology

Published:08 July 2020Publication History
First page image

References

  1. Martín Abadi and David G. Andersen. Learning to protect communications with adversarial neural cryptography. CoRR, abs/1610.06918, 2016.Google ScholarGoogle Scholar
  2. Hernán Aguirre, Hiroyuki Okazaki, and Yasushi Fuwa. An evolutionary multiobjective approach to design highly non-linear boolean functions. In Proceedings of the 9th Annual Conference on Genetic and Evolutionary Computation, GECCO '07, page 749--756, New York, NY, USA, 2007. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Timo Bartkewitz and Kerstin Lemke-Rust. Efficient template attacks based on probabilistic multi-class support vector machines. In Stefan Mangard, editor, Smart Card Research and Advanced Applications, pages 263--276, Berlin, Heidelberg, 2013. Springer Berlin Heidelberg.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lejla Batina, Domagoj Jakobovic, Nele Mentens, Stjepan Picek, Antonio de la Piedra, and Dominik Sisejkovic. S-box pipelining using genetic algorithms for high-throughput aes implementations: How fast can we go? In Willi Meier and Debdeep Mukhopadhyay, editors, Progress in Cryptology - INDOCRYPT 2014, pages 322--337, Cham, 2014. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. G. T. Becker. On the pitfalls of using arbiter-pufs as building blocks. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 34(8):1295--1307, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Georg T. Becker. The gap between promise and reality: On the insecurity of xor arbiter pufs. In Tim Güneysu and Helena Handschuh, editors, Cryptographic Hardware and Embedded Systems - CHES 2015, pages 535--555, Berlin, Heidelberg, 2015. Springer Berlin Heidelberg.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hans-Georg Beyer and Hans-Paul Schwefel. Evolution strategies -a comprehensive introduction. Natural Computing: An International Journal, 1(1):3--52, May 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Christopher M. Bishop. Pattern Recognition and Machine Learning (Information Science and Statistics). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Linda Burnett, W Millan, Edward Dawson, and A Clark. Simpler methods for generating better boolean functions with good cryptographic properties. Australas. J. Combin., 29:231--248, 2004.Google ScholarGoogle Scholar
  10. Linda Dee Burnett. Heuristic Optimization of Boolean Functions and Substitution Boxes for Cryptography. PhD thesis, Queensland University of Technology, 2005.Google ScholarGoogle Scholar
  11. Eleonora Cagli, Cécile Dumas, and Emmanuel Prouff. Convolutional Neural Networks with Data Augmentation Against Jitter-Based Countermeasures - Profiling Attacks Without Pre-processing. In Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, pages 45--68, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  12. Claude Carlet. Vectorial Boolean Functions for Cryptography. In Yves Crama and Peter L. Hammer, editors, Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pages 398--469. Cambridge University Press, New York, NY, USA, 1st edition, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  13. Claude Carlet. Boolean functions for cryptography and error-correcting codes. In Y. Crama, and P. L. Hammer, editors, Boolean Models and Methods in Mathematics, Computer Science, and Engineering, pages 257--397. Cambridge University Press, New York, 2011.Google ScholarGoogle Scholar
  14. Claude Carlet and Sylvain Guilley. Correlation-immune Boolean functions for easing counter measures to side-channel attacks, pages 41 -- 70. De Gruyter, Berlin, Boston, 2014.Google ScholarGoogle Scholar
  15. Claude Carlet, Annelie Heuser, and Stjepan Picek. Trade-offs for s-boxes: Cryptographic properties and side-channel resilience. In Dieter Gollmann, Atsuko Miyaji, and Hiroaki Kikuchi, editors, Applied Cryptography and Network Security, pages 393--414, Cham, 2017. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  16. Rafael Boix Carpi, Stjepan Picek, Lejla Batina, Federico Menarini, Domagoj Jakobovic, and Marin Golub. Glitch it if you can: Parameter search strategies for successful fault injection. In Aurélien Francillon and Pankaj Rohatgi, editors, Smart Card Research and Advanced Applications, pages 236--252, Cham, 2014. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jung-Wei Chou, Shou-De Lin, and Chen-Mou Cheng. On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. In Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence, AISec '12, page 105--110, New York, NY, USA, 2012. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Andrew J. Clark. Optimisation heuristics for cryptology. PhD thesis, Queensland University of Technology, 1998.Google ScholarGoogle Scholar
  19. J. A. Clark, J. L. Jacob, S. Maitra, and P. Stanica. Almost boolean functions: the design of boolean functions by spectral inversion. In The 2003 Congress on Evolutionary Computation, 2003. CEC '03., volume 3, pages 2173--2180 Vol. 3, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  20. J. A. Clark, J. L. Jacob, and S. Stepney. The design of s-boxes by simulated annealing. In Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753). volume 2, pages 1533--1537 Vol. 2, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  21. John A. Clark and Jeremy L. Jacob. Two-stage optimisation in the design of boolean functions. In E. P. Dawson, A. Clark, and Colin Boyd, editors, Information Security and Privacy, pages 242--254, Berlin, Heidelberg, 2000. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  22. John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, and William Millan. Evolving boolean functions satisfying multiple criteria. In Alfred Menezes and Palash Sarkar, editors, Progress in Cryptology --- INDOCRYPT 2002, pages 246--259, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  23. N. Cruz-Cortes, F. Rodriguez-Henriquez, and C. A. Coello Coello. An artificial immune system heuristic for generating short addition chains. IEEE Transactions on Evolutionary Computation, 12(1):1--24, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nareli Cruz-Cortés, Francisco Rodríguez-Henríquez, Raúl Juárez-Morales, and Carlos A. Coello Coello. Finding optimal addition chains using a genetic algorithm approach. In Yue Hao, Jiming Liu, Yuping Wang, Yiu-ming Cheung, Hujun Yin, Licheng Jiao, Jianfeng Ma, and Yong-Chang Jiao, editors, Computational Intelligence and Security, pages 208--215, Berlin, Heidelberg, 2005. Springer Berlin Heidelberg.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Thomas W. Cusick and Pantelimon Stănică. Cryptographic Boolean Functions and Applications. Elsevier Inc., San Diego, USA, 2009.Google ScholarGoogle Scholar
  26. M. Danziger and M. A. A. Henriques. Improved cryptanalysis combining differential and artificial neural network schemes. In 2014 International Telecommunications Symposium (ITS), pages 1--5, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  27. Flávio Luis de Mello and José A. M. Xexéo. Identifying encryption algorithms in ECB and CBC modes using computational intelligence. J. UCS, 24(1):25--42, 2018.Google ScholarGoogle Scholar
  28. J. Delvaux. Machine-learning attacks on polypufs, ob-pufs, rpufs, Ihs-pufs, and puf-fsms. IEEE Transactions on Information Forensics and Security, 14(8):2043--2058, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Saúl Domínguez-Isidro, Efrén Mezura-Montes, and Luis Guillermo Osorio-Hernández. Addition chain length minimization with evolutionary programming. In 13th Annual Genetic and Evolutionary Computation Conference, GECCO 2011, Companion Material Proceedings, Dublin, Ireland, July 12-16, 2011, pages 59--60, 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Saúl Domínguez-Isidro, Eirén Mezura-Montes, and Luis Guillermo Osorio-Hernández. Evolutionary programming for the length minimization of addition chains. Eng. Appl. of AI, 37:125--134, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  31. Kamil Dworak and Urszula Boryczka. Cryptanalysis of sdes using modified version of binary particle swarm optimization. In Manuel Núñez, Ngoc Thanh Nguyen, David Camacho, and Bogdan Trawiński, editors, Computational Collective Intelligence, pages 159--168, Cham, 2015. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  32. B. Ege, K. Papagiannopoulos, L. Batina, and S. Picek. Improving dpa resistance of s-boxes: How far can we go? In 2015 IEEE International Symposium on Circuits and Systems (ISCAS), pages 2013--2016, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  33. A. E. Eiben and James E. Smith. Introduction to Evolutionary Computing. Springer Publishing Company, Incorporated, 2nd edition, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  34. J. Fuller, W. Millan, and E. Dawson. Multi-objective optimisation of bijective s-boxes. In Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753), volume 2, pages 1525--1532 Vol. 2, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  35. Samaneh Ghandali, Georg T. Becker, Daniel Holcomb, and Christof Paar. A design methodology for stealthy parametric trojans and its application to bug attacks. In Benedikt Gierlichs and Axel Y. Poschmann, editors, Cryptographic Hardware and Embedded Systems - CHES 2016, pages 625--647, Berlin, Heidelberg, 2016. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  36. Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, and Debdeep Mukhopadhyay. Lightweight and side-channel secure 4 × 4 s-boxes from cellular automata rules. IACR Transactions on Symmetric Cryptology, 2018(3):311--334, Sep. 2018.Google ScholarGoogle ScholarCross RefCross Ref
  37. R. Gilmore, N. Hanley, and M. O'Neill. Neural network based attack on a masked implementation of AES. In 2015 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 106--111, May 2015.Google ScholarGoogle ScholarCross RefCross Ref
  38. Aron Gohr. Improving attacks on round-reduced speck32/64 using deep learning. In Alexandra Boldyreva and Daniele Micciancio, editors, Advances in Cryptology - CRYPTO 2019, pages 150--179, Cham, 2019. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Ian Goodfellow, Yoshua Bengio, and Aaron Courville. Deep Learning. MIT Press, 2016. http://www.deeplearningbook.org.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. K. Hasegawa, Y. Shi, and N. Togawa. Hardware trojan detection utilizing machine learning approaches. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pages 1891--1896, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  41. J. C. Hernandez, A. Seznec, and P. Isasi. On the design of state-of-the-art pseudorandom number generators by means of genetic programming. In Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753), volume 2, pages 1510--1516 Vol. 2, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  42. Benjamin Hettwer, Stefan Gehrer, and Tim Güneysu. Profiled power analysis attacks using convolutional neural networks with domain knowledge. In Carlos Cid and Michael J. Jacobson Jr., editors, Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, volume 11349 of Lecture Notes in Computer Science, pages 479--498. Springer, 2018.Google ScholarGoogle Scholar
  43. A. Heuser, S. Picek, S. Guilley, and N. Mentens. Lightweight ciphers and their side-channel resilience. IEEE Transactions on Computers, PP(99):1--1, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  44. Annelie Heuser, Stjepan Picek, Sylvain Guilley, and Nele Mentens. Side-channel analysis of lightweight ciphers: Does lightweight equal easy? In Radio Frequency Identification and IoT Security - 12th International Workshop, RFIDSec 2016, Hong Kong, China, November 30 - December 2, 2016, Revised Selected Papers, pages 91--104, 2016.Google ScholarGoogle Scholar
  45. Annelie Heuser and Michael Zohner. Intelligent Machine Homicide - Breaking Cryptographic Devices Using Support Vector Machines. In Werner Schindler and Sorin A. Huss, editors, COSADE, volume 7275 of LNCS, pages 249--264. Springer, 2012.Google ScholarGoogle Scholar
  46. John H. Holland. Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control and Artificial Intelligence. MIT Press, Cambridge, MA, USA, 1992.Google ScholarGoogle ScholarCross RefCross Ref
  47. G Hospodar, E De Mulder, and B Gierlichs. Least squares support vector machines for side-channel analysis. Center for Advanced Security Research Darmstadt, pages 99--104, 01 2011.Google ScholarGoogle Scholar
  48. Gabriel Hospodar, Benedikt Gierlichs, Elke De Mulder, Ingrid Verbauwhede, and Joos Vandewalle. Machine learning in side-channel analysis: a first study. Journal of Cryptographic Engineering, 1:293--302, 2011. Google ScholarGoogle ScholarCross RefCross Ref
  49. Radek Hrbacek and Vaclav Dvorak. Bent function synthesis by means of cartesian genetic programming. In Thomas Bartz-Beielstein, Jürgen Branke, Bogdan Filipič, and Jim Smith, editors, Parallel Problem Solving from Nature - PPSN XIII, pages 414--423, Cham, 2014. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  50. Georgi Ivanov, Nikolay Nikolov, and Svetla Nikova. Cryptographically strong s-boxes generated by modified immune algorithm. In Enes Pasalic and Lars R. Knudsen, editors, Cryptography and Information Security in the Balkans, pages 31--42, Cham, 2016. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  51. Georgi Ivanov, Nikolay Nikolov, and Svetla Nikova. Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties. Cryptography Commun., 8(2):247--276, April 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. T. Iwase, Y. Nozaki, M. Yoshikawa, and T. Kumaki. Detection technique for hardware trojans using machine learning in frequency domain. In 2015 IEEE 4th Global Conference on Consumer Electronics (GCCE), pages 185--186, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  53. Domagoj Jakobovic, Stjepan Picek, Marcella S. R. Martins, and Markus Wagner. A characterisation of s-box fitness landscapes in cryptography. In Proceedings of the Genetic and Evolutionary Computation Conference, GECCO '19, page 285--293, New York, NY, USA, 2019. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. N. Karimian, F. Tehranipoor, M. T. Rahman, S. Kelly, and D. Forte. Genetic algorithm for hardware trojan detection with ring oscillator network (ron). In 2015 IEEE International Symposium on Technologies for Homeland Security (HST), pages 1--6, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  55. Jonathan Katz and Yehuda Lindell. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series). Chapman & Hall/CRC, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Jaehun Kim, Stjepan Picek, Annelie Heuser, Shivam Bhasin, and Alan Hanjalic. Make some noise. unleashing the power of convolutional neural networks for profiled side-channel analysis. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2019(3):148--179, May 2019.Google ScholarGoogle ScholarCross RefCross Ref
  57. Lars R. Knudsen and Matthew J. B. Robshaw. The Block Cipher Companion. Springer Publishing Company, Incorporated, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  58. John Koza. Evolving a computer program to generate random numbers using the genetic programming paradigm. In Proceedings of the Fourth International Conference on Genetic Algorithms, pages 37--44. Morgan Kaufmann, 1991.Google ScholarGoogle Scholar
  59. John R. Koza. Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge, MA, USA, 1992.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. W. O. Krawec. A genetic algorithm to analyze the security of quantum cryptographic protocols. In 2016 IEEE Congress on Evolutionary Computation (CEC), pages 2098--2105, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. Walter Krawec, Stjepan Picek, and Domagoj Jakobovic. Evolutionary algorithms for the design of quantum protocols. In Paul Kaufmann and Pedro A. Castillo, editors, Applications of Evolutionary Computation, pages 220--236, Cham, 2019. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  62. Walter O. Krawec, Michael G. Nelson, and Eric P. Geiss. Automatic generation of optimal quantum key distribution protocols. In Proceedings of the Genetic and Evolutionary Computation Conference, GECCO '17, page 1153--1160, New York, NY, USA, 2017. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. A. Kulkarni, Y. Pino, and T. Mohsenin. Adaptive real-time trojan detection framework through machine learning. In 2016 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), pages 120--123, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  64. Mansoureh Labafniya, Stjepan Picek, Shahram [Etemadi Borujeni], and Nele Mentens. On the feasibility of using evolvable hardware for hardware trojan detection and prevention. Applied Soft Computing, 91:106247, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  65. Linus Lagerhjelm. Extracting information from encrypted data using deep neural networks. Master's thesis, Umeå University, Department of Applied Physics and Electronics, 2018.Google ScholarGoogle Scholar
  66. Carlos Lamenca-Martinez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda. Lamar: A new pseudorandom number generator evolved by means of genetic programming. In Thomas Philip Runarsson, Hans-Georg Beyer, Edmund Burke, Juan J. Merelo-Guervós, L. Darrell Whitley, and Xin Yao, editors, Parallel Problem Solving from Nature - PPSN IX, pages 850--859, Berlin, Heidelberg, 2006. Springer Berlin Heidelberg.Google ScholarGoogle Scholar
  67. E. C. Laskari, G. C. Meletiou, Y. C. Stamatiou, and M. N. Vrahatis. Cryptography and cryptanalysis through computational intelligence. In Nadia Nedjah, Ajith Abraham, and Luiza de Macedo Mourelle, editors, Computational Intelligence in Information Assurance and Security, pages 1--49, Berlin, Heidelberg, 2007. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  68. Alejandro León-Javier, Nareli Cruz-Cortés, Marco A. Moreno-Armendáriz, and Sandra Orantes-Jiménez. Finding minimal addition chains with a particle swarm optimization algorithm. In Arturo Hernández Aguirre, Raúl Monroy Borja, and Carlos Alberto Reyes Garciá, editors, MICAI 2009: Advances in Artificial Intelligence, pages 680--691, Berlin, Heidelberg, 2009. Springer Berlin Heidelberg.Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. Liran Lerman, Romain Poussier, Gianluca Bontempi, Olivier Markowitch, and François-Xavier Standaert. Template Attacks vs. Machine Learning Revisited (and the Curse of Dimensionality in Side-Channel Analysis). In COSADE 2015, Berlin, Germany, 2015. Revised Selected Papers, pages 20--33, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. Liran Lerman, Nikita Veshchikov, Stjepan Picek, and Olivier Markowitch. Higher order side-channel attack resilient s-boxes. In Proceedings of the 15th ACM International Conference on Computing Frontiers, CF '18, page 336--341, New York, NY, USA, 2018. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  71. Houssem Maghrebi, Thibault Portigliatti, and Emmanuel Prouff. Breaking cryptographic implementations using deep learning techniques.Google ScholarGoogle Scholar
  72. In Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings, pages 3--26, 2016.Google ScholarGoogle Scholar
  73. A. Maldini, N. Samwel, S. Picek, and L. Batina. Genetic algorithm-based electromagnetic fault injection. In 2018 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 35--42, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  74. Antun Maldini, Niels Samwel, Stjepan Picek, and Lejla Batina. Optimizing electromagnetic fault injection with genetic algorithms. In Jakub Breier, Xiaolu Hou, and Shivam Bhasin, editors, Automated Methods in Cryptographic Fault Analysis, pages 281--300, Cham, 2019. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  75. Stefan Mangard, Elisabeth Oswald, and Thomas Popp. Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security). Springer-Verlag, Berlin, Heidelberg, 2007.Google ScholarGoogle Scholar
  76. Luca Manzoni, Luca Mariot, and Eva Tuba. Does constraining the search space of ga always help? the case of balanced crossover operators. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO '19, page 151--152, New York, NY, USA, 2019. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Luca Manzoni, Luca Mariot, and Eva Tuba. Balanced crossover operators in genetic algorithms. Swarm and Evolutionary Computation, 54:100646, 2020.Google ScholarGoogle ScholarCross RefCross Ref
  78. Luca Mariot, Domagoj Jakobovic, Alberto Leporati, and Stjepan Picek. Hyper-bent boolean functions and evolutionary algorithms.Google ScholarGoogle Scholar
  79. In Lukas Sekanina, Ting Hu, Nuno Lourenço, Hendrik Richter, and Pablo García-Sánchez, editors, Genetic Programming, pages 262--277, Cham, 2019. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  80. Luca Mariot and Alberto Leporati. A genetic algorithm for evolving plateaued cryptographic boolean functions. In Adrian-Horia Dediu, Luis Magdalena, and Carlos Martín-Vide, editors, Theory and Practice of Natural Computing, pages 33--45, Cham, 2015. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Luca Mariot and Alberto Leporati. Heuristic search by particle swarm optimization of boolean functions for cryptographic applications. In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO Companion '15, page 1425--1426, New York, NY, USA, 2015. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Luca Mariot, Stjepan Picek, Domagoj Jakobovic, and Alberto Leporati. Evolutionary search of binary orthogonal arrays. In Anne Auger, Carlos M. Fonseca, Nuno Lourenço, Penousal Machado, Luís Paquete, and Darrell Whitley, editors, Parallel Problem Solving from Nature - PPSN XV, pages 121--133, Cham, 2018. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  83. Luca Mariot, Stjepan Picek, Domagoj Jakobovic, and Alberto Leporati. An evolutionary view on reversible shift-invariant transformations. In Ting Hu, Nuno Lourenço, Eric Medvet, and Federico Divina, editors, Genetic Programming, pages 118--134, Cham, 2020. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. Luca Mariot, Stjepan Picek, Alberto Leporati, and Domagoj Jakobovic. Cellular automata based s-boxes. Cryptography and Communications, 11(1):41--62, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography. CRC Press, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. W. Millan, L. Burnett, G. Carter, A. Clark, and E. Dawson. Evolutionary heuristics for finding cryptographically strong s-boxes. In Vijay Varadharajan and Yi Mu, editors, Information and Communication Security, pages 263--274, Berlin, Heidelberg, 1999. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  87. W. Millan, J. Fuller, and E. Dawson. New concepts in evolutionary search for boolean functions in cryptology. In The 2003 Congress on Evolutionary Computation, 2003. CEC '03., volume 3, pages 2157--2164 Vol. 3, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  88. William Millan, Andrew Clark, and Ed Dawson. An effective genetic algorithm for finding highly nonlinear boolean functions. In Yongfei Han, Tatsuaki Okamoto, and Sihan Qing, editors, Information and Communications Security, pages 149--158, Berlin, Heidelberg, 1997. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  89. William Millan, Andrew Clark, and Ed Dawson. Heuristic design of cryptographically strong balanced boolean functions. In Kaisa Nyberg, editor, Advances in Cryptology --- EUROCRYPT98, pages 489--499, Berlin, Heidelberg, 1998. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  90. William Millan, Andrew Clark, and Ed Dawson. Boolean function design using hill climbing methods. In Josef Pieprzyk, Rei Safavi-Naini, and Jennifer Seberry, editors, Information Security and Privacy, pages 1--11, Berlin, Heidelberg, 1999. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  91. Julian F. Miller. An empirical study of the efficiency of learning boolean functions using a cartesian genetic programming approach. In Proceedings of the 1st Annual Conference on Genetic and Evolutionary Computation - Volume 2, GECCO'99, page 1135--1142, San Francisco, CA, USA, 1999. Morgan Kaufmann Publishers Inc.Google ScholarGoogle Scholar
  92. Julian F. Miller. Cartesian genetic programming. In Julian F. Miller, editor, Cartesian Genetic Programming, pages 17--34, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  93. Thomas M. Mitchell. Machine Learning. McGraw-Hill, Inc., New York, NY, USA, 1 edition, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Nadia Nedjah and Luiza de Macedo Mourelle. Minimal addition chain for efficient modular exponentiation using genetic algorithms. In Tim Hendtlass and Moonis Ali, editors, Developments in Applied Artificial Intelligence, pages 88--98, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  95. Nadia Nedjah and Luiza de Macedo Mourelle. Minimal addition-subtraction chains using genetic algorithms. In Tatyana Yakhno, editor, Advances in Information Systems, pages 303--313, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  96. Nadia Nedjah and Luiza de Macedo Mourelle. Minimal Addition-Subtraction Sequences for Efficient Pre-processing in Large Window-Based Modular Exponentiation Using Genetic Algorithms. In Jiming Liu, Yiu-ming Cheung, and Hujun Yin, editors, Intelligent Data Engineering and Automated Learning, volume 2690 of Lect. Notes in Comp. Science, pages 329--336. Springer, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  97. Nadia Nedjah and Luiza de Macedo Mourelle. Finding minimal addition chains using ant colony. In Zheng Rong Yang, Hujun Yin, and Richard M. Everson, editors, Intelligent Data Engineering and Automated Learning - IDEAL 2004, pages 642--647, Berlin, Heidelberg, 2004. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  98. Nadia Nedjah and Luiza de Macedo Mourelle. High-performance SoC-based Implementation of Modular Exponentiation Using Evolutionary Addition Chains for Efficient Cryptography. Applied Soft Computing, 11(7):4302--4311, October 2011.Google ScholarGoogle ScholarDigital LibraryDigital Library
  99. David Oranchak. Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. In Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation, GECCO '08, page 1717--1718, New York, NY, USA, 2008. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. L. G. Osorio-Hernandez, E. Mezura-Montes, N. Cruz-Cortes, and F. Rodriguez-Henriquez. A genetic algorithm with repair and local search mechanisms able to find minimal length addition chains for small exponents. In 2009 IEEE Congress on Evolutionary Computation, pages 1422--1429, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  101. Artem Pavlenko, Alexander Semenov, and Vladimir Ulyantsev. Evolutionary computation techniques for constructing sat-based attacks in algebraic cryptanalysis. In Paul Kaufmann and Pedro A. Castillo, editors, Applications of Evolutionary Computation, pages 237--253, Cham, 2019. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  102. Pedro Peris-Lopez, Julio Cesar Hernandez-Castro, Juan M. Estevez-Tapiador, and Arturo Ribagorda. Lamed - a prng for epc class-1 generation-2 rfid specification. Comput. Stand. Interfaces, 31(1):88--97, January 2009.Google ScholarGoogle ScholarDigital LibraryDigital Library
  103. S. Picek, L. Batina, D. Jakolović, and R. B. Carpi. Evolving genetic algorithms for fault injection attacks. In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pages 1106--1111, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  104. S. Picek, B. Ege, K. Papagiannopoulos, L. Batina, and D. Jakobović. Optimality and beyond: The case of 4 × 4 s-boxes. In 2014 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), pages 80--83, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  105. S. Picek, A. Heuser, A. Jovic, and L. Batina. A systematic evaluation of profiling through focused feature selection. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27(12):2802--2815, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  106. S. Picek, K. Knezevic, and D. Jakobovic. On the evolution of bent (n, m) functions. In 2017 IEEE Congress on Evolutionary Computation (CEC), pages 2137--2144, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. S. Picek, K. Knezevic, D. Jakobovic, and C. Carlet. A search for differentially-6 uniform (n, n-2) functions. In 2018 IEEE Congress on Evolutionary Computation (CEC), pages 1--7, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. S. Picek, K. Knezevic, L. Mariot, D. Jakobovic, and A. Leporati. Evolving bent quaternary functions. In 2018 IEEE Congress on Evolutionary Computation (CEC), pages 1--8, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Stjepan Picek. Applications of evolutionary computation to cryptology. PhD thesis, Radboud University Nijmegen, The Netherlands, 2015.Google ScholarGoogle Scholar
  110. Stjepan Picek. Evolutionary computation and cryptology. In Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, GECCO '16 Companion, page 883--909, New York, NY, USA, 2016. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Stjepan Picek. Applications of soft computing in cryptology. In Dooho Choi and Sylvain Guilley, editors, Information Security Applications, pages 305--317, Cham, 2017. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  112. Stjepan Picek. Challenges in deep learning-based profiled side-channel analysis. In Shivam Bhasin, Avi Mendelson, and Mridul Nandi, editors, Security, Privacy, and Applied Cryptography Engineering, pages 9--12, Cham, 2019. Springer International Publishing.Google ScholarGoogle Scholar
  113. Stjepan Picek, Lejla Batina, Pieter Buzing, and Domagoj Jakobovic. Fault injection with a new flavor: Memetic algorithms make a difference. In Stefan Mangard and Axel Y. Poschmann, editors, Constructive Side-Channel Analysis and Secure Design, pages 159--173, Cham, 2015. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  114. Stjepan Picek, Lejla Batina, and Domagoj Jakobovic. Evolving dpa-resistant boolean functions. In Thomas Bartz-Beielstein, Jürgen Branke, Bogdan Filipič, and Jim Smith, editors, Parallel Problem Solving from Nature - PPSN XIII, pages 812--821, Cham, 2014. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  115. Stjepan Picek, Lejla Batina, Domagoj Jakobović, Barış Ege, and Marin Golub. S-box, set, match: A toolbox for s-box analysis. In David Naccache and Damien Sauveron, editors, Information Security Theory and Practice. Securing the Internet of Things, pages 140--149, Berlin, Heidelberg, 2014. Springer Berlin Heidelberg.Google ScholarGoogle ScholarDigital LibraryDigital Library
  116. Stjepan Picek, Claude Carlet, Sylvain Guilley, Julian F. Miller, and Domagoj Jakobovic. Evolutionary algorithms for boolean functions in diverse domains of cryptography. Evolutionary Computation, 24(4):667--694, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Stjepan Picek, Claude Carlet, Domagoj Jakobovic, Julian F. Miller, and Lejla Batina. Correlation immunity of boolean functions: An evolutionary algorithms perspective. In Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO '15, page 1095--1102, New York, NY, USA, 2015. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  118. Stjepan Picek, Carlos A. Coello, Domagoj Jakobovic, and Nele Mentens. Finding short and implementation-friendly addition chains with evolutionary algorithms. Journal of Heuristics, 24(3):457--481, June 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  119. Stjepan Picek, Carlos A. Coello Coello, Domagoj Jakobovic, and Nele Mentens. Evolutionary algorithms for finding short addition chains: Going the distance. In Francisco Chicano, Bin Hu, and Pablo García-Sánchez, editors, Evolutionary Computation in Combinatorial Optimization, pages 121--137, Cham, 2016. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  120. Stjepan Picek, Marko Cupic, and Leon Rotim. A new cost function for evolution of s-boxes. Evolutionary Computation, 24(4):695--718, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  121. Stjepan Picek, Bariş Ege, Lejla Batina, Domagoj Jakobovic, undefinedukasz Chmielewski, and Marin Golub. On using genetic algorithms for intrinsic side-channel resistance: The case of aes s-box. In Proceedings of the First Workshop on Cryptography and Security in Computing Systems, CS2 '14, page 13--18, New York, NY, USA, 2014. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Stjepan Picek, Sylvain Guilley, Claude Carlet, Domagoj Jakobovic, and Julian F. Miller. Evolutionary approach for finding correlation immune boolean functions of order t with minimal hamming weight. In Adrian-Horia Dediu, Luis Magdalena, and Carlos Martín-Vide, editors, Theory and Practice of Natural Computing, pages 71--82 Cham, 2015 Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  123. Stjepan Picek, Annelie Heuser, and Sylvain Guilley. Template attack versus Bayes classifier. Journal of Cryptographic Engineering, 7(4):343--351, Nov 2017.Google ScholarGoogle ScholarCross RefCross Ref
  124. Stjepan Picek, Annelie Heuser, Alan Jovic, Shivam Bhasin, and Francesco Regazzoni. The curse of class imbalance and conflicting metrics with machine learning for side-channel evaluations. IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019(1):209--237, 2019.Google ScholarGoogle Scholar
  125. Stjepan Picek, Annelie Heuser, Alan Jovic, Simone A. Ludwig, Sylvain Guilley, Domagoj Jakobovic, and Nele Mentens. Side-channel analysis and machine learning: A practical perspective. In 2017 International Joint Conference on Neural Networks, IJCNN 2017, Anchorage, AK, USA, May 14-19, 2017, pages 4095--4102, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  126. Stjepan Picek and Domagoj Jakobovic. Evolving algebraic constructions for designing bent boolean functions. In Proceedings of the Genetic and Evolutionary Computation Conference 2016, GECCO '16, page 781--788, New York, NY, USA, 2016. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. Stjepan Picek and Domagoj Jakobovic. On the design of s-box constructions with genetic programming. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO '19, page 395--396, New York, NY, USA, 2019. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Stjepan Picek, Domagoj Jakobovic, and Marin Golub. Evolving cryptographically sound boolean functions. In Proceedings of the 15th Annual Conference Companion on Genetic and Evolutionary Computation, GECCO '13 Companion, page 191--192, New York, NY, USA, 2013. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  129. Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Lejla Batina, and Marko Cupic. Cryptographic boolean functions: One output, many design criteria. Applied Soft Computing, 40:635 -- 653, 2016.Google ScholarGoogle Scholar
  130. Stjepan Picek, Domagoj Jakobovic, Julian F. Miller, Elena Marchiori, and Lejla Batina. Evolutionary methods for the construction of cryptographic boolean functions. In Penousal Machado, Malcolm I. Heywood, James McDermott, Mauro Castelli, Pablo García-Sánchez, Paolo Burelli, Sebastian Risi, and Kevin Sim, editors, Genetic Programming, pages 192--204, Cham, 2015. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  131. Stjepan Picek, Domagoj Jakobovic, and Una-May O'Reilly. Cryptobench: Benchmarking evolutionary algorithms with cryptographic problems. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO '17, page 1597--1604, New York, NY, USA, 2017. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  132. Stjepan Picek, Karlo Knezevic, Domagoj Jakobovic, and Ante Derek. C3po: Cipher construction with cartesian genetic programming. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO '19, page 1625--1633, New York, NY, USA, 2019. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  133. Stjepan Picek, Elena Marchiori, Lejla Batina, and Domagoj Jakobovic. Combining evolutionary computation and algebraic constructions to find cryptography-relevant boolean functions. In Thomas Bartz-Beielstein, Jürgen Branke, Bogdan Filipič, and Jim Smith, editors, Parallel Problem Solving from Nature - PPSN XIII, pages 822--831, Cham, 2014. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  134. Stjepan Picek, Luca Mariot, Alberto Leporati, and Domagoj Jakobovic. Evolving s-boxes based on cellular automata with genetic programming. In Proceedings of the Genetic and Evolutionary Computation Conference Companion, GECCO '17, page 251--252, New York, NY, USA, 2017. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  135. Stjepan Picek, Luca Mariot, Bohan Yang, Domagoj Jakobovic, and Nele Mentens. Design of s-boxes defined with cellular automata rules. In Proceedings of the Computing Frontiers Conference, CF'17, page 409--414, New York, NY, USA, 2017. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  136. Stjepan Picek, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, and Lejla Batina. Modified transparency order property: Solution or just another attempt. In Rajat Subhra Chakraborty, Peter Schwabe, and Jon Solworth, editors, Security, Privacy, and Applied Cryptography Engineering, pages 210--227, Cham, 2015. Springer International Publishing.Google ScholarGoogle Scholar
  137. Stjepan Picek, Robert I. McKay, Roberto Santana, and Tom D. Gedeon. Fighting the symmetries: The structure of cryptographic boolean function spaces. In Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO '15, page 457--464, New York, NY, USA, 2015. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  138. Stjepan Picek, Julian F. Miller, Domagoj Jakobovic, and Lejla Batina. Cartesian genetic programming approach for generating substitution boxes of different sizes. In Proceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation, GECCO Companion '15, page 1457--1458, New York, NY, USA, 2015. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  139. Stjepan Picek, Kostas Papagiannopoulos, Barış Ege, Lejla Batina, and Domagoj Jakobovic. Confused by confusion: Systematic evaluation of dpa resistance of various s-boxes. In Willi Meier and Debdeep Mukhopadhyay, editors, Progress in Cryptology - INDOCRYPT 2014, pages 374--390, Cham, 2014. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  140. Stjepan Picek, Ioannis Petros Samiotis, Jaehun Kim, Annelie Heuser, Shivam Bhasin, and Axel Legay. On the performance of convolutional neural networks for side-channel analysis. In Anupam Chattopadhyay, Chester Rebeiro, and Yuval Yarom, editors, Security, Privacy, and Applied Cryptography Engineering, pages 157--176, Cham, 2018. Springer International Publishing.Google ScholarGoogle Scholar
  141. Stjepan Picek, Dominik Sisejkovic, and Domagoj Jakobovic. Immunological algorithms paradigm for construction of boolean functions with good cryptographic properties. Engineering Applications of Artificial Intelligence, 62:320 -- 330, 2017.Google ScholarGoogle Scholar
  142. Stjepan Picek, Dominik Sisejkovic, Domagoj Jakobovic, Lejla Batina, Bohan Yang, Danilo Sijacic, and Nele Mentens. Extreme pipelining towards the best area-performance trade-off in hardware. In David Pointcheval, Abderrahmane Nitaj, and Tajjeeddine Rachidi, editors, Progress in Cryptology - AFRICACRYPT 2016, pages 147--166, Cham, 2016. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  143. Stjepan Picek, Dominik Sisejkovic, Vladimir Rozic, Bohan Yang, Domagoj Jakobovic, and Nele Mentens. Evolving cryptographic pseudorandom number generators.Google ScholarGoogle Scholar
  144. In Julia Handl, Emma Hart, Peter R. Lewis, Manuel López-Ibáñez, Gabriela Ochoa, and Ben Paechter, editors, Parallel Problem Solving from Nature - PPSN XIV, pages 613--622, Cham, 2016. Springer International Publishing.Google ScholarGoogle Scholar
  145. Stjepan Picek, Bohan Yang, Vladimir Rozic, and Nele Mentens. On the construction of hardware-friendly 4 × 4 and 5 × 5 s-boxes. In Roberto Avanzi and Howard Heys, editors, Selected Areas in Cryptography - SAC 2016, pages 161--179, Cham, 2017. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  146. Stjepan Picek, Bohan Yang, Vladimir Rozic, Jo Vliegen, Jori Winderickx, Thomas De Cnudde, and Nele Mentens. Prngs for masking applications and their mapping to evolvable hardware. In Kerstin Lemke-Rust and Michael Tunstall, editors, Smart Card Research and Advanced Applications, pages 209--227, Cham, 2017. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  147. A. Poorghanad, A. Sadr, and A. Kashanipour. Generating high quality pseudo random number using evolutionary methods. In 2008 International Conference on Computational Intelligence and Security, volume 1, pages 331--335, 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  148. Emmanuel Prouff, Remi Strullu, Ryad Benadjila, Eleonora Cagli, and Cécile Dumas. Study of deep learning techniques for side-channel analysis and introduction to ASCAD database. IACR Cryptology ePrint Archive, 2018:53, 2018.Google ScholarGoogle Scholar
  149. Ulrich Rührmair, Frank Sehnke, Jan Sölter, Gideon Dror, Srinivas Devadas, and Jürgen Schmidhuber. Modeling attacks on physical unclonable functions. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, page 237--249, New York, NY, USA, 2010. Association for Computing Machinery.Google ScholarGoogle ScholarDigital LibraryDigital Library
  150. U. Rührmair, J. Sölter, F. Sehnke, X. Xu, A. Mahmoud, V. Stoyanova, G. Dror, J. Schmidhuber, W. Burleson, and S. Devadas. Puf modeling attacks on simulated and silicon data. IEEE Transactions on Information Forensics and Security, 8(11):1876--1891, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  151. U. Rührmair and M. van Dijk. Pufs in security protocols: Attack models and security evaluations. In 2013 IEEE Symposium on Security and Privacy, pages 286--300, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  152. Sayandeep Saha, Rajat Subhra Chakraborty, Srinivasa Shashank Nuthakki, Anshul, and Debdeep Mukhopadhyay. Improved test pattern generation for hardware trojan detection using genetic algorithm and boolean satisfiability. In Tim Güneysu and Helena Handschuh, editors, Cryptographic Hardware and Embedded Systems - CHES 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings, volume 9293 of Lecture Notes in Computer Science, pages 577--596. Springer, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  153. Sayandeep Saha, Dirmanto Jap, Sikhar Patranabis, Debdeep Mukhopadhyay, Shivam Bhasin, and Pallab Dasgupta. Automatic characterization of exploitable faults: A machine learning approach. IEEE Trans. Information Forensics and Security, 14(4):954--968, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  154. Bruce Schneier. Applied Cryptography (2nd Ed.): Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., USA, 1995.Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Lukáš Sekanina. Virtual reconfigurable circuits for real-world applications of evolvable hardware. In AAndy M. Tyrrell, Pauline C. Haddow, and Jim Torresen, editors, Evolvable Systems: From Biology to Hardware, pages 186--197, Berlin, Heidelberg, 2003. Springer Berlin Heidelberg.Google ScholarGoogle ScholarCross RefCross Ref
  156. Lee Spector. Automatic Quantum Computer Programming: A Genetic Programming Approach (Genetic Programming). Springer-Verlag, Berlin, Heidelberg, 2006.Google ScholarGoogle Scholar
  157. Petr Tesař. A New Method for Generating High Non-linearity S-Boxes. Radioengineering, 19(1):23--26, April 2010.Google ScholarGoogle Scholar
  158. Johannes Tobisch and Georg T. Becker. On the scaling of machine learning attacks on pufs with application to noise bifurcation. In Stefan Mangard and Patrick Schaumont, editors, Radio Frequency Identification, pages 17--31, Cham, 2015. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  159. Léo Weissbart, Stjepan Picek, and Lejla Batina. One trace is all it takes: Machine learning-based side-channel attack on eddsa. In Shivam Bhasin, Avi Mendelson, and Mridul Nandi, editors, Security, Privacy, and Applied Cryptography Engineering, pages 86--105, Cham, 2019. Springer International Publishing.Google ScholarGoogle Scholar
  160. Nils Wisiol, Georg T. Becker, Marian Margraf, Tudor A. A. Soroceanu, Johannes Tobisch, and Benjamin Zengin. Breaking the lightweight secure puf: Understanding the relation of input transformations and machine learning resistance. In Sonia Belaïd and Tim Güneysu, editors, Smart Card Research and Advanced Applications, pages 40--54, Cham, 2020. Springer International Publishing.Google ScholarGoogle ScholarCross RefCross Ref
  161. Stephen Wolfram. Random sequence generation by cellular automata. Adv. Appl. Math., 7(2):123--169, June 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  162. Lichao Wu, Gerard Ribera, Noemie Beringuier-Boher, and Stjepan Picek. A fast characterization method for semi-invasive fault injection attacks. In Stanislaw Jarecki, editor, Topics in Cryptology - CT-RSA 2020, pages 146--170, Cham, 2020. Springer International Publishing.Google ScholarGoogle ScholarDigital LibraryDigital Library
  1. Evolutionary computation and machine learning in cryptology

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GECCO '20: Proceedings of the 2020 Genetic and Evolutionary Computation Conference Companion
          July 2020
          1982 pages
          ISBN:9781450371278
          DOI:10.1145/3377929

          Copyright © 2020 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 July 2020

          Check for updates

          Qualifiers

          • tutorial

          Acceptance Rates

          Overall Acceptance Rate1,669of4,410submissions,38%

          Upcoming Conference

          GECCO '24
          Genetic and Evolutionary Computation Conference
          July 14 - 18, 2024
          Melbourne , VIC , Australia

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader