- Metaheuristic Optimization Algorithms Research
- Evolutionary Algorithms and Applications
- Scheduling and Optimization Algorithms
- Coding theory and cryptography
- Cryptographic Implementations and Security
- Advanced Multi-Objective Optimization Algorithms
- graph theory and CDMA systems
- Algorithms and Data Compression
- DNA and Biological Computing
- Cellular Automata and Applications
- Chaos-based Image/Signal Encryption
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Malware Detection Techniques
- Advanced Control Systems Optimization
- Distributed and Parallel Computing Systems
- Protein Degradation and Inhibitors
- Advanced Manufacturing and Logistics Optimization
- Scheduling and Timetabling Solutions
- Error Correcting Code Techniques
- Vehicle Routing Optimization Methods
- Evolution and Genetic Dynamics
- Resource-Constrained Project Scheduling
- Reinforcement Learning in Robotics
- Receptor Mechanisms and Signaling
- Optimization and Search Problems
University of Zagreb
2015-2024
Faculty of Electrical Engineering and Computing in Zagreb
2013-2021
The field of side-channel analysis has made significant progress over time. Side-channel is now used in practice design companies as well test laboratories, and the security products against attacks significantly improved. However, there are still some remaining issues to be solved for become more effective. consists two steps, commonly referred identification exploitation. understanding leakage building suitable models. exploitation using identified models extract secret key. In scenarios...
Abstract The prediction and design of photonic features have traditionally been guided by theory-driven computational methods, spanning a wide range direct solvers optimization techniques. Motivated enormous advances in the field machine learning, there has recently growing interest developing complementary data-driven methods for photonics. Here, we demonstrate several predictive generative approaches characterization inverse crystals. Concretely, built data set 20,000 two-dimensional...
Priority rules are one of the most common and popular approaches to real-time scheduling. Over last decades, several methods have been developed generate automatically. In addition, it has shown that combining into ensembles is better than using a single rule in many cases. this paper, we analyze different ways create use previously through genetic programming. our study, classify as either collaborative or coordinated, depending on how used. first case, all contribute creation same...
Boolean functions with good cryptographic properties like high nonlinearity and algebraic degree play an important in the security of stream block ciphers. Such may be designed, for instance, by constructions or metaheuristics. This paper investigates use Evolutionary Algorithms (EAs) to design homogeneous bent functions, i.e., that are maximally nonlinear whose normal form contains only monomials same degree. In our work, we evaluate three genotype encodings four fitness functions. Our...
The role of Boolean functions is prominent in several areas including cryptography, sequences, and coding theory. Therefore, various methods for the construction with desired properties are direct interest. New motivations on cryptography attendant new have emerged over years. There still many combinations design criteria left unexplored this matter evolutionary computation can play a distinct role. This article concentrates two scenarios use cryptography. first uses as source nonlinearity...