Svetla Nikova
Svetla Nikova
Verified email at esat.kuleuven.be
TitleCited byYear
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, Y Law
RFID. Security and Privacy, 1-18, 2012
3482012
Threshold implementations against side-channel attacks and glitches
S Nikova, C Rechberger, V Rijmen
Information and Communications Security, 529-545, 2006
2702006
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
International Workshop on Information Security Applications, 309-323, 2009
2692009
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Information Security and Cryptology–ICISC 2008, 218-234, 2009
2432009
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on the Theory and Application of Cryptology and …, 2014
1392014
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Annual Cryptology Conference, 764-783, 2015
1202015
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on Cryptology in Africa, 267-284, 2014
1012014
Threshold implementations of all 3× 3 and 4× 4 S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz
International Workshop on Cryptographic Hardware and Embedded Systems, 76-91, 2012
892012
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
832009
Masking AES with Shares in Hardware
T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen
International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016
652016
Efficient and first-order DPA resistant implementations of Keccak
B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, G Van Assche
International Conference on Smart Card Research and Advanced Applications …, 2013
632013
Searching keywords with wildcards on encrypted data
S Sedghi, P Van Liesdonk, S Nikova, P Hartel, W Jonker
International Conference on Security and Cryptography for Networks, 138-153, 2010
602010
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
542015
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
International Conference on Applied Cryptography and Network Security, 532-549, 2011
512011
Classification of Boolean functions of 6 variables or less with respect to some cryptographic properties
A Braeken, Y Borissov, S Nikova, B Preneel
International Colloquium on Automata, Languages, and Programming, 324-334, 2005
492005
Threshold implementations of small S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup
Cryptography and Communications 7 (1), 3-33, 2015
462015
On proactive secret sharing schemes
V Nikov, S Nikova
International Workshop on Selected Areas in Cryptography, 308-325, 2004
442004
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
G Ivanov, N Nikolov, S Nikova
Cryptography and Communications 8 (2), 247-276, 2016
432016
Higher-order threshold implementation of the AES S-box
T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova
International Conference on Smart Card Research and Advanced Applications …, 2015
372015
On Boolean functions with generalized cryptographic properties
A Braeken, V Nikov, S Nikova, B Preneel
International Conference on Cryptology in India, 120-135, 2004
352004
The system can't perform the operation now. Try again later.
Articles 1–20