Volgen
Svetla Nikova
Svetla Nikova
Geverifieerd e-mailadres voor esat.kuleuven.be
Titel
Geciteerd door
Geciteerd door
Jaar
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, Y Law
RFID. Security and Privacy, 1-18, 2012
4812012
Threshold implementations against side-channel attacks and glitches
S Nikova, C Rechberger, V Rijmen
Information and Communications Security, 529-545, 2006
4462006
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Information Security and Cryptology–ICISC 2008, 218-234, 2009
3432009
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
International Workshop on Information Security Applications, 309-323, 2009
3102009
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Annual Cryptology Conference, 764-783, 2015
2032015
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on the Theory and Application of Cryptology and …, 2014
1872014
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
International Conference on Cryptology in Africa, 267-284, 2014
1412014
Masking AES with Shares in Hardware
T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen
International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016
1352016
Threshold implementations of all 3× 3 and 4× 4 S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz
International workshop on cryptographic hardware and embedded systems, 76-91, 2012
1292012
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
IEEE Trans. Image process, 2009
1042009
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
892015
Efficient and First-Order DPA Resistant Implementations of Keccak
B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, GV Assche
International Conference on Smart Card Research and Advanced Applications …, 2013
832013
Searching keywords with wildcards on encrypted data
S Sedghi, P Liesdonk, S Nikova, P Hartel, W Jonker
International Conference on Security and Cryptography for Networks, 138-153, 2010
782010
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
G Ivanov, N Nikolov, S Nikova
Cryptography and Communications 8 (2), 247-276, 2016
732016
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
International Conference on Applied Cryptography and Network Security, 532-549, 2011
672011
Threshold implementations of small S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup
Cryptography and Communications 7 (1), 3-33, 2015
652015
Classification of Boolean functions of 6 variables or less with respect to some cryptographic properties
A Braeken, Y Borissov, S Nikova, B Preneel
International colloquium on automata, languages, and programming, 324-334, 2005
612005
Does coupling affect the security of masked implementations?
T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen
International Workshop on Constructive Side-Channel Analysis and Secure …, 2017
592017
Higher-order threshold implementation of the AES S-box
TD Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova
International conference on smart card research and advanced applications …, 2015
562015
On proactive secret sharing schemes
V Nikov, S Nikova
International Workshop on Selected Areas in Cryptography, 308-325, 2004
562004
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20