Follow
Svetla Petkova-Nikova
Svetla Petkova-Nikova
Verified email at esat.kuleuven.be
Title
Cited by
Cited by
Year
Threshold implementations against side-channel attacks and glitches
S Nikova, C Rechberger, V Rijmen
Information and Communications Security, 529-545, 2006
6062006
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, Y Law
RFID. Security and Privacy, 1-18, 2012
5792012
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Information Security and Cryptology–ICISC 2008, 218-234, 2009
4002009
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Information Security Applications: 10th International Workshop, WISA 2009 …, 2009
3362009
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
2812015
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
2312014
Masking AES with shares in hardware
T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen
International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016
1752016
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
1682014
Threshold implementations of all 3× 3 and 4× 4 S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz
International workshop on cryptographic hardware and embedded systems, 76-91, 2012
1552012
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
IEEE Trans. Image process, 2009
1152009
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
1032015
Efficient and First-Order DPA Resistant Implementations of Keccak
B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, G Van Assche
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
922014
Searching keywords with wildcards on encrypted data
S Sedghi, P Van Liesdonk, S Nikova, P Hartel, W Jonker
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
872010
Does coupling affect the security of masked implementations?
T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen
Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017
852017
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
G Ivanov, N Nikolov, S Nikova
Cryptography and Communications 8, 247-276, 2016
842016
Threshold implementations of small S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup
Cryptography and Communications 7, 3-33, 2015
812015
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
International Conference on Applied Cryptography and Network Security, 532-549, 2011
722011
Higher-order threshold implementation of the AES S-box
T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
712016
Cryptographically strong S-boxes generated by modified immune algorithm
G Ivanov, N Nikolov, S Nikova
Cryptography and Information Security in the Balkans: Second International …, 2016
642016
On proactive secret sharing schemes
V Nikov, S Nikova
International Workshop on Selected Areas in Cryptography, 308-325, 2004
642004
The system can't perform the operation now. Try again later.
Articles 1–20