Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Karlo Knezevic"'
Publikováno v:
IEEE Access, Vol 11, Pp 284-299 (2023)
The choice of activation functions can significantly impact the performance of neural networks. Due to an ever-increasing number of new activation functions being proposed in the literature, selecting the appropriate activation function becomes even
Externí odkaz:
https://doaj.org/article/7046f84b639944bf888889a4ef864be7
Autor:
Karlo Knezevic
Publikováno v:
MIPRO
Genetic algorithms are well-known and frequently used heuristic methods for solving optimization problems. In modern cryptography, the generation of large primes has an important role in the implementation of public-key cryptosystems such as RSA. In
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d6be9e878156d6972dd5a2001c1933b0
https://www.bib.irb.hr/1158922
https://www.bib.irb.hr/1158922
Publikováno v:
GECCO (Companion)
In this paper, we ask a question whether evolutionary algorithms can evolve cryptographic algorithms when no precise design criteria are given. Our strategy utilizes Cartesian Genetic Programming in the bi-level optimization setting with multiple pop
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030154615
CARDIS
CARDIS 2018-17th Smart Card Research and Advanced Application Conference
CARDIS 2018-17th Smart Card Research and Advanced Application Conference, Nov 2018, Montpellier, France
HAL
CARDIS
CARDIS 2018-17th Smart Card Research and Advanced Application Conference
CARDIS 2018-17th Smart Card Research and Advanced Application Conference, Nov 2018, Montpellier, France
HAL
International audience; The profiled side-channel analysis represents the most powerful category of side-channel attacks. In this context, the security eval-uator (i.e., attacker) gains access to a profiling device to build a precise model which is u
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::08dfc142a5f41ddfff7d6ba8b280ac26
https://doi.org/10.1007/978-3-030-15462-2_3
https://doi.org/10.1007/978-3-030-15462-2_3
Publikováno v:
CEC
Boolean functions have a prominent role in many real-world applications, which makes them a very active research domain. Throughout the years, various heuristic techniques proved to be an attractive choice for the construction of Boolean functions wi
Publikováno v:
CEC
Finding cryptographic primitives satisfying certain properties is a difficult problem. In this domain, besides the algebraic constructions, researchers often use heuristics. There exists a set of interesting problems related to the notion of differen
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::592e2c3e01526598140726b5436c2a3f
https://www.bib.irb.hr/960681
https://www.bib.irb.hr/960681
Publikováno v:
Theory and Practice of Natural Computing ISBN: 9783030040697
TPNC
TPNC
Disjunct Matrices (DM) are a particular kind of binary matrices which have been especially applied to solve the Non-Adaptive Group Testing (NAGT) problem, where the task is to detect any configuration of t defectives out of a population of N items. T
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f0b9b03505fc0d3bd6da30ab1b456d4d
https://doi.org/10.1007/978-3-030-04070-3_12
https://doi.org/10.1007/978-3-030-04070-3_12
Publikováno v:
CEC
Boolean functions as well as their generalizations, vectorial Boolean functions are extremely active areas of research. Their applications can be found in domains such as error correcting codes, communication, and cryptography. Accordingly, various m
Publikováno v:
GECCO (Companion)
Evolutionary algorithms have proved their worth on various optimization problems over the course of years. However, some techniques like genetic programming (GP) and Cartesian genetic programming (CGP) are not restricted only to optimization problems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::55b172933bd68e415abe3d24f902d8ff
https://www.bib.irb.hr/891440
https://www.bib.irb.hr/891440
Autor:
Karlo Knezevic
Publikováno v:
MIPRO
The known attacks on different cryptosystems lead to a number of criteria that the implemented cryptographic algorithms (ciphers) must satisfy. The design of cryptographic systems needs to consider various characteristics simultaneously, which can be
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ff003b5eafd065dcefd26b2d6b531eeb
https://www.bib.irb.hr/891454
https://www.bib.irb.hr/891454