Claude Carlet, Stjepan Picek (2023), On the exponents of APN power functions and Sidon sets, SUM-free sets, and Dickson Polynomials, In Advances in Mathematics of Communications Volume 17 p.1507-1525.

Jing Xu, Gorka Abad, Stjepan Picek (2023), Rethinking the Trigger-injecting Position in Graph Backdoor Attack, In Proceedings of the 2023 International Joint Conference on Neural Networks (IJCNN) p.1-8, IEEE.

Stjepan Picek, Guilherme Perin, Luca Mariot, Lichao Wu, Lejla Batina (2023), SoK: Deep Learning-based Physical Side-channel Analysis, In ACM Computing Surveys Volume 55.

Guilherme Perin, Lichao Wu, Stjepan Picek (2023), The Need for Speed: A Fast Guessing Entropy Calculation for Deep Learning-Based SCA, In Algorithms Volume 16.

Jing Xu, Stefanos Koffas, Oǧuzhan Ersoy, Stjepan Picek (2023), Watermarking Graph Neural Networks based on Backdoor Attacks, In Proceedings - 8th IEEE European Symposium on Security and Privacy, Euro S and P 2023 p.1179-1197, Institute of Electrical and Electronics Engineers (IEEE).

Vipul Arora, Ileana Buhan, Guilherme Perin, Stjepan Picek (2022), A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage, Vincent Grosso, Thomas Pöppelmann (Eds.), In Smart Card Research and Advanced Applications - 20th International Conference, CARDIS 2021, Revised Selected Papers Volume 13173 p.80-96, Springer.

Huimin Li, Nele Mentens, Stjepan Picek (2022), A scalable SIMD RISC-V based processor with customized vector extensions for CRYSTALS-kyber, In Proceedings of the 59th ACM/IEEE Design Automation Conference, DAC 2022 p.733-738, Institute of Electrical and Electronics Engineers (IEEE).

Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek (2022), Can You Hear It? Backdoor Attacks via Ultrasonic Triggers, In WiseML 2022 - Proceedings of the 2022 ACM Workshop on Wireless Security and Machine Learning p.57-62, Association for Computing Machinery (ACM).

Sudharshan Swaminathan, Łukasz Chmielewski, Guilherme Perin, Stjepan Picek (2022), Deep Learning-Based Side-Channel Analysis Against AES Inner Rounds, Jianying Zhou, Sudipta Chattopadhyay, Sridhar Adepu, Cristina Alcaraz, Lejla Batina, Emiliano Casalicchio, Chenglu Jin, Jingqiang Lin, Eleonora Losiouk, Suryadipta Majumdar, Weizhi Meng, Stjepan Picek, Yury Zhauniarovich, Jun Shao, Chunhua Su, Cong Wang, Saman Zonouz (Eds.), In Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S and P, SCI, SecMT, SiMLA, Proceedings p.165-182, Springer.

Norica Băcuieți, Lejla Batina, Stjepan Picek (2022), Deep Neural Networks Aiding Cryptanalysis: A Case Study of the Speck Distinguisher, Giuseppe Ateniese, Daniele Venturi (Eds.), In Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Proceedings p.809-829, Springer.