Searched for: author%3A%22Jakobovi%C4%87%2C+Domagoj%22
(1 - 15 of 15)
document
Coello, Carlos Coello (author), Krcek, M. (author), Durasevic, Marko (author), Mariot, L. (author), Jakobovic, Domagoj (author), Picek, S. (author)
Evolutionary algorithms have been successfully applied to attack Physically Unclonable Functions (PUFs). CMA-ES is recognized as the most powerful option for a type of attack called the reliability attack. In this paper, we take a step back and systematically evaluate several metaheuristics for the challenge-response pair-based attack on...
conference paper 2023
document
Knezevic, Karlo (author), Jakobović, Domagoj (author), Picek, S. (author), Ðurasević, Marko (author)
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even more difficult. Consequently, many researchers approach this problem from a different angle, in...
journal article 2022
document
Mariot, L. (author), Jakobovic, Domagoj (author), Bäck, Thomas (author), Hernandez-Castro, Julio C. (author)
This chapter provides a general overview of AI methods used to support the design of cryptographic primitives and protocols. After giving a brief introduction to the basic concepts underlying the field of cryptography, we review the most researched use cases concerning the use of AI techniques and models to design cryptographic primitives,...
book chapter 2022
document
Mariot, L. (author), Picek, S. (author), Jakobovic, Domagoj (author), Leporati, Alberto (author)
Reversible Cellular Automata (RCA) are a particular kind of shift-invariant transformations characterized by dynamics composed only of disjoint cycles. They have many applications in the simulation of physical systems, cryptography, and reversible computing. In this work, we formulate the search of a specific class of RCA – namely, those...
journal article 2021
document
Carlet, Claude (author), Jakobovic, Domagoj (author), Picek, S. (author)
In the last few decades, evolutionary algorithms were successfully applied numerous times for creating Boolean functions with good cryptographic properties. Still, the applicability of such approaches was always limited as the cryptographic community knows how to construct suitable Boolean functions with deterministic algebraic constructions....
conference paper 2021
document
Jakobovic, Domagoj (author), Picek, S. (author), Martins, Marcella S.R. (author), Wagner, Markus (author)
Boolean functions have numerous applications in domains as diverse as coding theory, cryptography, and telecommunications. Heuristics play an important role in the construction of Boolean functions with the desired properties for a specific purpose. However, there are only sparse results trying to understand the problem's difficulty. With...
journal article 2021
document
Knezevic, Karlo (author), Picek, S. (author), Jakobovic, Domagoj (author), Hernandez-Castro, Julio (author)
Finding optimal adversarial dynamics between defenders and attackers in large network systems is a complex problem one can approach from several perspectives. The results obtained are often not satisfactory since they either concentrate on only one party or run very simplified scenarios that are hard to correlate with realistic settings. To...
conference paper 2020
document
Mariot, L. (author), Picek, S. (author), Jakobovic, Domagoj (author), Leporati, Alberto (author)
We consider the problem of evolving a particular kind of shift-invariant transformation – namely, Reversible Cellular Automata (RCA) defined by conserved landscape rules – using GA and GP. To this end, we employ three different optimization strategies: a single-objective approach carried out with GA and GP where only the reversibility...
conference paper 2020
document
Picek, S. (author), Jakobovic, Domagoj (author)
conference paper 2020
document
Carlet, Claude (author), Djurasevic, Marko (author), Jakobovic, Domagoj (author), Picek, S. (author)
We investigate whether it is possible to evolve cryptographically strong S-boxes that have additional constraints on their structure. We investigate two scenarios: where S-boxes additionally have a specific sum of values in rows, columns, or diagonals and the scenario where we check that the difference between the Hamming weights of inputs...
conference paper 2020
document
Manzoni, Luca (author), Jakobovic, Domagoj (author), Mariot, L. (author), Picek, S. (author), Castelli, Mauro (author)
Tasks related to Natural Language Processing (NLP) have recently been the focus of a large research endeavor by the machine learning community. The increased interest in this area is mainly due to the success of deep learning methods. Genetic Programming (GP), however, was not under the spotlight with respect to NLP tasks. Here, we propose a...
conference paper 2020
document
Djurasevic, Marko (author), Jakobovic, Domagoj (author), Picek, S. (author)
Substitution boxes (S-boxes) are nonlinear mappings that represent one of the core parts of many cryptographic algorithms (ciphers). If S-box does not possess good properties, a cipher would be susceptible to attacks. To design suitable S-boxes, we can use heuristics as it allows significant freedom in the selection of required cryptographic...
conference paper 2020
document
Ðurasević, M. (author), Jakobovic, Domagoj (author), Martins, Marcella Scoczynski Ribeiro (author), Picek, S. (author), Wagner, Markus (author)
Genetic programming is an often-used technique for symbolic regression: finding symbolic expressions that match data from an unknown function. To make the symbolic regression more efficient, one can also use dimensionally-aware genetic programming that constrains the physical units of the equation. Nevertheless, there is no formal analysis of...
conference paper 2020
document
Christensen, Thomas (author), Loh, Charlotte (author), Picek, S. (author), Jakobović, Domagoj (author), Jing, Li (author), Fisher, Sophie (author), Ceperic, Vladimir (author), Joannopoulos, John D. (author), Soljačić, Marin (author)
The prediction and design of photonic features have traditionally been guided by theory-driven computational methods, spanning a wide range of direct solvers and optimization techniques. Motivated by enormous advances in the field of machine learning, there has recently been a growing interest in developing complementary data-driven methods...
journal article 2020
document
Mariot, Luca (author), Picek, S. (author), Leporati, Alberto (author), Jakobovic, Domagoj (author)
Cellular Automata (CA) represent an interesting approach to design Substitution<br/>Boxes (S-boxes) having good cryptographic properties and low implementation costs. From the cryptographic perspective, up to now there have been only ad-hoc studies about specific kinds of CA, the best known example being the χ nonlinear transformation used in...
journal article 2019
Searched for: author%3A%22Jakobovi%C4%87%2C+Domagoj%22
(1 - 15 of 15)