Follow
Svetla Petkova-Nikova
Svetla Petkova-Nikova
Verified email at esat.kuleuven.be
Title
Cited by
Cited by
Year
Threshold implementations against side-channel attacks and glitches
S Nikova, C Rechberger, V Rijmen
Information and Communications Security, 529-545, 2006
5992006
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, Y Law
RFID. Security and Privacy, 1-18, 2012
5742012
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Information Security and Cryptology–ICISC 2008, 218-234, 2009
3952009
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Information Security Applications: 10th International Workshop, WISA 2009 …, 2009
3312009
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
2792015
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
2272014
Masking AES with shares in hardware
T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen
International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016
1732016
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
1682014
Threshold implementations of all 3× 3 and 4× 4 S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz
International workshop on cryptographic hardware and embedded systems, 76-91, 2012
1552012
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
IEEE Trans. Image process, 2009
1142009
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
1022015
Efficient and First-Order DPA Resistant Implementations of Keccak
B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, G Van Assche
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
922014
Searching keywords with wildcards on encrypted data
S Sedghi, P Van Liesdonk, S Nikova, P Hartel, W Jonker
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
862010
Does coupling affect the security of masked implementations?
T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen
Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017
822017
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
G Ivanov, N Nikolov, S Nikova
Cryptography and Communications 8, 247-276, 2016
822016
Threshold implementations of small S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup
Cryptography and Communications 7, 3-33, 2015
792015
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
International Conference on Applied Cryptography and Network Security, 532-549, 2011
722011
Higher-order threshold implementation of the AES S-box
T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
702016
On proactive secret sharing schemes
V Nikov, S Nikova
International Workshop on Selected Areas in Cryptography, 308-325, 2004
642004
Cryptographically strong S-boxes generated by modified immune algorithm
G Ivanov, N Nikolov, S Nikova
Cryptography and Information Security in the Balkans: Second International …, 2016
622016
The system can't perform the operation now. Try again later.
Articles 1–20