Folgen
Svetla Petkova-Nikova
Svetla Petkova-Nikova
Bestätigte E-Mail-Adresse bei esat.kuleuven.be - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Threshold implementations against side-channel attacks and glitches
S Nikova, C Rechberger, V Rijmen
Information and Communications Security, 529-545, 2006
6372006
KLEIN: a new family of lightweight block ciphers
Z Gong, S Nikova, Y Law
RFID. Security and Privacy, 1-18, 2012
5892012
Secure hardware implementation of non-linear functions in the presence of glitches
S Nikova, V Rijmen, M Schläffer
Information Security and Cryptology–ICISC 2008, 218-234, 2009
4212009
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Information Security Applications: 10th International Workshop, WISA 2009 …, 2009
3392009
Consolidating masking schemes
O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
2962015
Higher-order threshold implementations
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
2512014
Masking AES with shares in hardware
T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen
International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016
1782016
A more efficient AES threshold implementation
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
1702014
Threshold implementations of all 3× 3 and 4× 4 S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz
International workshop on cryptographic hardware and embedded systems, 76-91, 2012
1542012
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
IEEE Trans. Image process, 2009
1162009
Trade-offs for threshold implementations illustrated on AES
B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015
1102015
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
G Ivanov, N Nikolov, S Nikova
Cryptography and Communications 8, 247-276, 2016
1082016
Efficient and First-Order DPA Resistant Implementations of Keccak
B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, G Van Assche
Smart Card Research and Advanced Applications: 12th International Conference …, 2014
972014
Does coupling affect the security of masked implementations?
T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen
Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017
962017
Searching keywords with wildcards on encrypted data
S Sedghi, P Van Liesdonk, S Nikova, P Hartel, W Jonker
Security and Cryptography for Networks: 7th International Conference, SCN …, 2010
952010
Threshold implementations of small S-boxes
B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup
Cryptography and Communications 7, 3-33, 2015
842015
Higher-order threshold implementation of the AES S-box
T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova
Smart Card Research and Advanced Applications: 14th International Conference …, 2016
732016
Cryptographically strong S-boxes generated by modified immune algorithm
G Ivanov, N Nikolov, S Nikova
Cryptography and Information Security in the Balkans: Second International …, 2016
722016
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
International Conference on Applied Cryptography and Network Security, 532-549, 2011
722011
Classification of Boolean functions of 6 variables or less with respect to some cryptographic properties
A Braeken, Y Borissov, S Nikova, B Preneel
International colloquium on automata, languages, and programming, 324-334, 2005
682005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20