Searched for: author%3A%22Mariot%2C+L.%22
(1 - 11 of 11)
document
Mariot, L. (author), Picek, S. (author), R Yorgova, R.A. (author)
One of the Round 3 Finalists in the NIST post-quantum cryptography call is the Classic McEliece cryptosystem. Although it is one of the most secure cryptosystems, the large size of its public key remains a practical limitation. In this work, we propose a McEliece-type cryptosystem using large minimum distance error-correcting codes derived from...
journal article 2023
document
Picek, S. (author), Perin, G. (author), Mariot, L. (author), Wu, L. (author), Batina, Lejla (author)
Side-channel attacks represent a realistic and serious threat to the security of embedded devices for already almost three decades. A variety of attacks and targets they can be applied to have been introduced, and while the area of side-channel attacks and their mitigation is very well-researched, it is yet to be consolidated. Deep learning...
journal article 2023
document
Schijlen, Fiske (author), Wu, Lichao (author), Mariot, L. (author)
Side-channel analysis (SCA) is a class of attacks on the physical implementation of a cipher, which enables the extraction of confidential key information by exploiting unintended leaks generated by a device. In recent years, researchers have observed that neural networks (NNs) can be utilized to perform highly effective SCA profiling, even...
journal article 2023
document
Coello, Carlos Coello (author), Krcek, M. (author), Durasevic, Marko (author), Mariot, L. (author), Jakobovic, Domagoj (author), Picek, S. (author)
Evolutionary algorithms have been successfully applied to attack Physically Unclonable Functions (PUFs). CMA-ES is recognized as the most powerful option for a type of attack called the reliability attack. In this paper, we take a step back and systematically evaluate several metaheuristics for the challenge-response pair-based attack on...
conference paper 2023
document
Castelli, Mauro (author), Manzoni, Luca (author), Mariot, L. (author), Nobile, Marco S. (author), Tangherloni, Andrea (author)
In the crowded environment of bio-inspired population-based metaheuristics, the Salp Swarm Optimization (SSO) algorithm recently appeared and immediately gained a lot of momentum. Inspired by the peculiar spatial arrangement of salp colonies, which are displaced in long chains following a leader, this algorithm seems to provide an interesting...
review 2022
document
Mariot, L. (author), Jakobovic, Domagoj (author), Bäck, Thomas (author), Hernandez-Castro, Julio C. (author)
This chapter provides a general overview of AI methods used to support the design of cryptographic primitives and protocols. After giving a brief introduction to the basic concepts underlying the field of cryptography, we review the most researched use cases concerning the use of AI techniques and models to design cryptographic primitives,...
book chapter 2022
document
Mariot, L. (author), Picek, S. (author), Jakobovic, Domagoj (author), Leporati, Alberto (author)
Reversible Cellular Automata (RCA) are a particular kind of shift-invariant transformations characterized by dynamics composed only of disjoint cycles. They have many applications in the simulation of physical systems, cryptography, and reversible computing. In this work, we formulate the search of a specific class of RCA – namely, those...
journal article 2021
document
Gadouleau, Maximilien (author), Mariot, L. (author)
Latin squares and hypercubes are combinatorial designs with several applications in statistics, cryptography and coding theory. In this paper, we generalize a construction of Latin squares based on bipermutive cellular automata (CA) to the case of Latin hypercubes of dimension. In particular, we prove that linear bipermutive CA (LBCA)...
conference paper 2020
document
Mariot, L. (author), Manzoni, Luca (author), Dennunzio, Alberto (author)
We continue the study of asynchrony immunity in cellular automata (CA), which can be considered as a generalization of correlation immunity in the case of vectorial Boolean functions. The property could have applications as a countermeasure for side-channel attacks in CA-based cryptographic primitives, such as S-boxes and pseudorandom number...
journal article 2020
document
Mariot, L. (author), Picek, S. (author), Jakobovic, Domagoj (author), Leporati, Alberto (author)
We consider the problem of evolving a particular kind of shift-invariant transformation – namely, Reversible Cellular Automata (RCA) defined by conserved landscape rules – using GA and GP. To this end, we employ three different optimization strategies: a single-objective approach carried out with GA and GP where only the reversibility...
conference paper 2020
document
Manzoni, Luca (author), Jakobovic, Domagoj (author), Mariot, L. (author), Picek, S. (author), Castelli, Mauro (author)
Tasks related to Natural Language Processing (NLP) have recently been the focus of a large research endeavor by the machine learning community. The increased interest in this area is mainly due to the success of deep learning methods. Genetic Programming (GP), however, was not under the spotlight with respect to NLP tasks. Here, we propose a...
conference paper 2020
Searched for: author%3A%22Mariot%2C+L.%22
(1 - 11 of 11)