Follow
Svetla Petkova-Nikova
Svetla Petkova-Nikova
Verified email at esat.kuleuven.be
Title
Cited by
Cited by
Year
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, Y Law
RFID. Security and Privacy, 1-18, 2012
5292012
Threshold implementations against side-channel attacks and glitches
S Nikova, C Rechberger, V Rijmen
Information and Communications Security, 529-545, 2006
5282006
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Information Security and Cryptology–ICISC 2008, 218-234, 2009
3742009
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Information Security Applications: 10th International Workshop, WISA 2009 …, 2009
3242009
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
2462015
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
2122014
Masking AES with shares in hardware
T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen
Cryptographic Hardware and Embedded Systems–CHES 2016: 18th International …, 2016
1612016
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
1592014
Threshold implementations of all 3× 3 and 4× 4 S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
1402012
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
IEEE Trans. Image process, 2009
1112009
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
962015
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
G Ivanov, N Nikolov, S Nikova
Cryptography and Communications 8, 247-276, 2016
892016
Efficient and First-Order DPA Resistant Implementations of Keccak
B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, G Van Assche
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
872014
Searching keywords with wildcards on encrypted data
S Sedghi, P Van Liesdonk, S Nikova, P Hartel, W Jonker
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
842010
Threshold implementations of small S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup
Cryptography and Communications 7, 3-33, 2015
772015
Does coupling affect the security of masked implementations?
T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen
Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017
722017
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
Applied Cryptography and Network Security: 9th International Conference …, 2011
702011
Higher-order threshold implementation of the AES S-box
T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
642016
Classification of Boolean functions of 6 variables or less with respect to some cryptographic properties
A Braeken, Y Borissov, S Nikova, B Preneel
Automata, Languages and Programming: 32nd International Colloquium, ICALP …, 2005
632005
On proactive secret sharing schemes
V Nikov, S Nikova
Selected Areas in Cryptography: 11th International Workshop, SAC 2004 …, 2005
612005
The system can't perform the operation now. Try again later.
Articles 1–20