BibTeX records: Svetla Nikova

download as .bib file

@article{DBLP:journals/tches/HirataMALMNS24,
  author       = {Haruka Hirata and
                  Daiki Miyahara and
                  Victor Arribas and
                  Yang Li and
                  Noriyuki Miura and
                  Svetla Nikova and
                  Kazuo Sakiyama},
  title        = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection
                  M{\&}M},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {133--156},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.133-156},
  doi          = {10.46586/TCHES.V2024.I1.133-156},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/HirataMALMNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AskelandNN24,
  author       = {Amund Askeland and
                  Svetla Nikova and
                  Ventzislav Nikov},
  title        = {Who Watches the Watchers: Attacking Glitch Detection Circuits},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {157--179},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.157-179},
  doi          = {10.46586/TCHES.V2024.I1.157-179},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/AskelandNN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ToprakhisarNN24,
  author       = {Dilara Toprakhisar and
                  Svetla Nikova and
                  Ventzislav Nikov},
  title        = {{CAPABARA:} {A} Combined Attack on {CAPA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/287},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ToprakhisarNN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ToprakhisarNN24a,
  author       = {Dilara Toprakhisar and
                  Svetla Nikova and
                  Ventzislav Nikov},
  title        = {SoK: Parameterization of Fault Adversary Models - Connecting Theory
                  and Practice},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {289},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/289},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ToprakhisarNN24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SarencheZNP24,
  author       = {Roozbeh Sarenche and
                  Ren Zhang and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Time-Averaged Analysis of Selfish Mining in Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {363},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/363},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SarencheZNP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PiccioneABCDNPR23,
  author       = {Enrico Piccione and
                  Samuele Andreoli and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  George Petrides and
                  Vincent Rijmen},
  title        = {An Optimal Universal Construction for the Threshold Implementation
                  of Bijective S-Boxes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {10},
  pages        = {6700--6710},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2023.3287534},
  doi          = {10.1109/TIT.2023.3287534},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/PiccioneABCDNPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/DhoogheN23,
  author       = {Siemen Dhooghe and
                  Svetla Nikova},
  editor       = {Claude Carlet and
                  Kalikinkar Mandal and
                  Vincent Rijmen},
  title        = {The Random Fault Model},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference,
                  Fredericton, Canada, August 14-18, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14201},
  pages        = {191--212},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-53368-6\_10},
  doi          = {10.1007/978-3-031-53368-6\_10},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/DhoogheN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirataMALMNS23,
  author       = {Haruka Hirata and
                  Daiki Miyahara and
                  Victor Arribas and
                  Yang Li and
                  Noriyuki Miura and
                  Svetla Nikova and
                  Kazuo Sakiyama},
  title        = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection
                  M{\&}M},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1129},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1129},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirataMALMNS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreoliPBSN23,
  author       = {Samuele Andreoli and
                  Enrico Piccione and
                  Lilya Budaghyan and
                  Pantelimon Stanica and
                  Svetla Nikova},
  title        = {On Decompositions of Permutations in Quadratic Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1632},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1632},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreoliPBSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AskelandNN23,
  author       = {Amund Askeland and
                  Svetla Nikova and
                  Ventzislav Nikov},
  title        = {Who Watches the Watchers: Attacking Glitch Detection Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1647},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1647},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AskelandNN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/DhoogheN22,
  author       = {Siemen Dhooghe and
                  Svetla Nikova},
  title        = {Resilient uniformity: applying resiliency in masking},
  journal      = {Cryptogr. Commun.},
  volume       = {14},
  number       = {1},
  pages        = {41--58},
  year         = {2022},
  url          = {https://doi.org/10.1007/s12095-021-00515-w},
  doi          = {10.1007/S12095-021-00515-W},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DhoogheN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AskelandDNRZ22,
  author       = {Amund Askeland and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen and
                  Zhenda Zhang},
  editor       = {Ileana Buhan and
                  Tobias Schneider},
  title        = {Guarding the First Order: The Rise of {AES} Maskings},
  booktitle    = {Smart Card Research and Advanced Applications - 21st International
                  Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13820},
  pages        = {103--122},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25319-5\_6},
  doi          = {10.1007/978-3-031-25319-5\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AskelandDNRZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isgt/ZobiriGND22,
  author       = {Fairouz Zobiri and
                  Mariana Gama and
                  Svetla Nikova and
                  Geert Deconinck},
  title        = {A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party
                  Computation},
  booktitle    = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies
                  Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ISGT50606.2022.9817546},
  doi          = {10.1109/ISGT50606.2022.9817546},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isgt/ZobiriGND22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasZN22,
  author       = {Victor Arribas and
                  Zhenda Zhang and
                  Svetla Nikova},
  title        = {{LLTI:} Low-Latency Threshold Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {418},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/418},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasZN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PiccioneABCDNPR22,
  author       = {Enrico Piccione and
                  Samuele Andreoli and
                  Lilya Budaghyan and
                  Claude Carlet and
                  Siemen Dhooghe and
                  Svetla Nikova and
                  George Petrides and
                  Vincent Rijmen},
  title        = {An Optimal Universal Construction for the Threshold Implementation
                  of Bijective S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1141},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1141},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PiccioneABCDNPR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ArribasZN21,
  author       = {Victor Arribas and
                  Zhenda Zhang and
                  Svetla Nikova},
  title        = {{LLTI:} Low-Latency Threshold Implementations},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {5108--5123},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3123527},
  doi          = {10.1109/TIFS.2021.3123527},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ArribasZN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/FigueiredoMRNP21,
  author       = {Sammy de Figueiredo and
                  Akash Madhusudan and
                  Vincent Reniers and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Chih{-}Cheng Hung and
                  Jiman Hong and
                  Alessio Bechini and
                  Eunjee Song},
  title        = {Exploring the storj network: a security analysis},
  booktitle    = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual
                  Event, Republic of Korea, March 22-26, 2021},
  pages        = {257--264},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3412841.3441908},
  doi          = {10.1145/3412841.3441908},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/FigueiredoMRNP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhoogheNR21,
  author       = {Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {First-Order Hardware Sharings of the {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/734},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhoogheNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhoogheN21,
  author       = {Siemen Dhooghe and
                  Svetla Nikova},
  title        = {Resilient Uniformity: Applying Resiliency in Masking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1094},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1094},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhoogheN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/DhoogheN20,
  author       = {Siemen Dhooghe and
                  Svetla Nikova},
  editor       = {Pierre{-}Yvan Liardet and
                  Nele Mentens},
  title        = {Let's Tessellate: Tiling for Security Against Advanced Probe and Fault
                  Adversaries},
  booktitle    = {Smart Card Research and Advanced Applications - 19th International
                  Conference, {CARDIS} 2020, Virtual Event, November 18-19, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12609},
  pages        = {181--195},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68487-7\_12},
  doi          = {10.1007/978-3-030-68487-7\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/DhoogheN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DhoogheN20,
  author       = {Siemen Dhooghe and
                  Svetla Nikova},
  editor       = {Stanislaw Jarecki},
  title        = {My Gadget Just Cares for Me - How {NINA} Can Prove Security Against
                  Combined Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {35--55},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_3},
  doi          = {10.1007/978-3-030-40186-3\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DhoogheN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/ArribasWMN20,
  author       = {Victor Arribas and
                  Felix Wegener and
                  Amir Moradi and
                  Svetla Nikova},
  title        = {Cryptographic Fault Diagnosis using VerFI},
  booktitle    = {2020 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2020, San Jose, CA, USA, December 7-11, 2020},
  pages        = {229--240},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/HOST45689.2020.9300264},
  doi          = {10.1109/HOST45689.2020.9300264},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/host/ArribasWMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/ReniersG00MLNLL20,
  author       = {Vincent Reniers and
                  Yuan Gao and
                  Ren Zhang and
                  Paolo Viviani and
                  Akash Madhusudan and
                  Bert Lagaisse and
                  Svetla Nikova and
                  Dimitri Van Landuyt and
                  Riccardo Lombardi and
                  Bart Preneel and
                  Wouter Joosen},
  editor       = {Chih{-}Cheng Hung and
                  Tom{\'{a}}s Cern{\'{y}} and
                  Dongwan Shin and
                  Alessio Bechini},
  title        = {Authenticated and auditable data sharing via smart contract},
  booktitle    = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online
                  event, [Brno, Czech Republic], March 30 - April 3, 2020},
  pages        = {324--331},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3341105.3373957},
  doi          = {10.1145/3341105.3373957},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/ReniersG00MLNLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-09563,
  author       = {Anastasiya Gorodilova and
                  Natalia N. Tokareva and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeria Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Roman Lebedev and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Irina Pankratova and
                  Marina Pudovkina and
                  Vincent Rijmen and
                  Aleksei Udovenko},
  title        = {On the Sixth International Olympiad in Cryptography {NSUCRYPTO}},
  journal      = {CoRR},
  volume       = {abs/2005.09563},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.09563},
  eprinttype    = {arXiv},
  eprint       = {2005.09563},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-09563.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhoogheN20,
  author       = {Siemen Dhooghe and
                  Svetla Nikova},
  title        = {Let's Tessellate: Tiling for Security Against Advanced Probe and Fault
                  Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1146},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1146},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhoogheN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/NikovaNR19,
  author       = {Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Decomposition of permutations in a finite field},
  journal      = {Cryptogr. Commun.},
  volume       = {11},
  number       = {3},
  pages        = {379--384},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12095-018-0317-2},
  doi          = {10.1007/S12095-018-0317-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/NikovaNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/VariciNNR19,
  author       = {Kerem Varici and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Constructions of S-boxes with uniform sharing},
  journal      = {Cryptogr. Commun.},
  volume       = {11},
  number       = {3},
  pages        = {385--398},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12095-018-0345-y},
  doi          = {10.1007/S12095-018-0345-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/VariciNNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/GorodilovaACGIK19,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions from the fourth International Students' Olympiad
                  in Cryptography {(NSUCRYPTO)}},
  journal      = {Cryptologia},
  volume       = {43},
  number       = {2},
  pages        = {138--174},
  year         = {2019},
  url          = {https://doi.org/10.1080/01611194.2018.1517834},
  doi          = {10.1080/01611194.2018.1517834},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mam/ArribasNR19,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Guards in action: First-order {SCA} secure implementations of {KETJE}
                  without additional randomness},
  journal      = {Microprocess. Microsystems},
  volume       = {71},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.micpro.2019.102859},
  doi          = {10.1016/J.MICPRO.2019.102859},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mam/ArribasNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/MeyerANNR19,
  author       = {Lauren De Meyer and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {M{\&}M: Masks and Macs against Physical Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2019},
  number       = {1},
  pages        = {25--50},
  year         = {2019},
  url          = {https://doi.org/10.13154/tches.v2019.i1.25-50},
  doi          = {10.13154/TCHES.V2019.I1.25-50},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/MeyerANNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DhoogheNR19,
  author       = {Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Petkova{-}Nikova and
                  Vincent Rijmen},
  title        = {Threshold Implementations in the Robust Probing Model},
  booktitle    = {Proceedings of {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2019, London, UK, November 11, 2019},
  pages        = {30--37},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338467.3358949},
  doi          = {10.1145/3338467.3358949},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DhoogheNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BilginNR19,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {TIS'19: Theory of Implementation Security Workshop 2019},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2701--2702},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3353552},
  doi          = {10.1145/3319535.3353552},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BilginNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019tis,
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Petkova{-}Nikova and
                  Vincent Rijmen},
  title        = {Proceedings of {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2019, London, UK, November 11, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338467},
  doi          = {10.1145/3338467},
  isbn         = {978-1-4503-6827-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2019tis.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlyAN19,
  author       = {Abdelrahaman Aly and
                  Aysajan Abidin and
                  Svetla Nikova},
  title        = {Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {334},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/334},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AlyAN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhoogheN19,
  author       = {Siemen Dhooghe and
                  Svetla Nikova},
  title        = {My Gadget Just Cares For Me - How {NINA} Can Prove Security Against
                  Combined Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhoogheN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DhoogheNR19,
  author       = {Siemen Dhooghe and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Threshold Implementations in the Robust Probing Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1005},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DhoogheNR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasWMN19,
  author       = {Victor Arribas and
                  Felix Wegener and
                  Amir Moradi and
                  Svetla Nikova},
  title        = {Cryptographic Fault Diagnosis using VerFI},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1312},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1312},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasWMN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ArribasBPNR18,
  author       = {Victor Arribas and
                  Beg{\"{u}}l Bilgin and
                  George Petrides and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {1},
  pages        = {269--290},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i1.269-290},
  doi          = {10.13154/TCHES.V2018.I1.269-290},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ArribasBPNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ReparazMBANNS18,
  author       = {Oscar Reparaz and
                  Lauren De Meyer and
                  Beg{\"{u}}l Bilgin and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Nigel P. Smart},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {{CAPA:} The Spirit of Beaver Against Physical Attacks},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {121--151},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_5},
  doi          = {10.1007/978-3-319-96884-1\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ReparazMBANNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsd/ArribasNR18,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Martin Novotn{\'{y}} and
                  Nikos Konofaos and
                  Amund Skavhaug},
  title        = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje
                  Without Additional Randomness},
  booktitle    = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague,
                  Czech Republic, August 29-31, 2018},
  pages        = {492--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/DSD.2018.00088},
  doi          = {10.1109/DSD.2018.00088},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsd/ArribasNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AlyAN18,
  author       = {Abdelrahaman Aly and
                  Aysajan Abidin and
                  Svetla Nikova},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {291--309},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_16},
  doi          = {10.1007/978-3-662-58387-6\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AlyAN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icecsys/ArribasNR18,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {VerMI: Verification Tool for Masked Implementations},
  booktitle    = {25th {IEEE} International Conference on Electronics, Circuits and
                  Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018},
  pages        = {381--384},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICECS.2018.8617841},
  doi          = {10.1109/ICECS.2018.8617841},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icecsys/ArribasNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-02059,
  author       = {Anastasiya Gorodilova and
                  Sergey Agievich and
                  Claude Carlet and
                  Evgeny Gorkunov and
                  Valeriya Idrisova and
                  Nikolay Kolomeec and
                  Alexandr Kutsenko and
                  Svetla Nikova and
                  Alexey Oblaukhov and
                  Stjepan Picek and
                  Bart Preneel and
                  Vincent Rijmen and
                  Natalia N. Tokareva},
  title        = {Problems and solutions of the Fourth International Students' Olympiad
                  in Cryptography {NSUCRYPTO}},
  journal      = {CoRR},
  volume       = {abs/1806.02059},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.02059},
  eprinttype    = {arXiv},
  eprint       = {1806.02059},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/VariciNNR18,
  author       = {Kerem Varici and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Constructions of S-boxes with uniform sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/VariciNNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovaNR18,
  author       = {Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Decomposition of Permutations in a Finite Field},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovaNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasNR18,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje
                  without Additional Randomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/806},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MeyerANNR18,
  author       = {Lauren De Meyer and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {M{\&}M: Masks and Macs against Physical Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MeyerANNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/CnuddeN17,
  author       = {Thomas De Cnudde and
                  Svetla Nikova},
  title        = {Securing the {PRESENT} Block Cipher Against Combined Side-Channel
                  Analysis and Fault Attacks},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {25},
  number       = {12},
  pages        = {3291--3301},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVLSI.2017.2713483},
  doi          = {10.1109/TVLSI.2017.2713483},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/CnuddeN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/AshurDLMMNRRS0P17,
  author       = {Tomer Ashur and
                  Jeroen Delvaux and
                  Sanghan Lee and
                  Pieter Maene and
                  Eduard Marin and
                  Svetla Nikova and
                  Oscar Reparaz and
                  Vladimir Rozic and
                  Dave Singel{\'{e}}e and
                  Bohan Yang and
                  Bart Preneel},
  editor       = {Srdjan Capkun and
                  Sherman S. M. Chow},
  title        = {A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area
                  Network},
  booktitle    = {Cryptology and Network Security - 16th International Conference, {CANS}
                  2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11261},
  pages        = {347--369},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-02641-7\_16},
  doi          = {10.1007/978-3-030-02641-7\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/AshurDLMMNRRS0P17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CnuddeBGNNR17,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Sylvain Guilley},
  title        = {Does Coupling Affect the Security of Masked Implementations?},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 8th International
                  Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10348},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64647-3\_1},
  doi          = {10.1007/978-3-319-64647-3\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CnuddeBGNNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasBPNR17,
  author       = {Victor Arribas and
                  Beg{\"{u}}l Bilgin and
                  George Petrides and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1193},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1193},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasBPNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazMBANNS17,
  author       = {Oscar Reparaz and
                  Lauren De Meyer and
                  Beg{\"{u}}l Bilgin and
                  Victor Arribas and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Nigel P. Smart},
  title        = {{CAPA:} The Spirit of Beaver against Physical Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1195},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1195},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazMBANNS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArribasNR17,
  author       = {Victor Arribas and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {VerMI: Verification Tool for Masked Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArribasNR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/IvanovNN16,
  author       = {Georgi Ivanov and
                  Nikolay Nikolov and
                  Svetla Nikova},
  title        = {Reversed genetic algorithms for generation of bijective s-boxes with
                  good cryptographic properties},
  journal      = {Cryptogr. Commun.},
  volume       = {8},
  number       = {2},
  pages        = {247--276},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12095-015-0170-5},
  doi          = {10.1007/S12095-015-0170-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/IvanovNN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Masking {AES} With d+1 Shares in Hardware},
  booktitle    = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  pages        = {43},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366.2996428},
  doi          = {10.1145/2996366.2996428},
  timestamp    = {Sat, 30 Sep 2023 09:36:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BilginNR16,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Theory of Implementation Security Workshop (TIs 2016)},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1875--1876},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990488},
  doi          = {10.1145/2976749.2990488},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BilginNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Benedikt Gierlichs and
                  Axel Y. Poschmann},
  title        = {Masking {AES} with d+1 Shares in Hardware},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International
                  Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9813},
  pages        = {194--212},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53140-2\_10},
  doi          = {10.1007/978-3-662-53140-2\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/CnuddeN16,
  author       = {Thomas De Cnudde and
                  Svetla Nikova},
  title        = {More Efficient Private Circuits {II} through Threshold Implementations},
  booktitle    = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2016, Santa Barbara, CA, USA, August 16, 2016},
  pages        = {114--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FDTC.2016.15},
  doi          = {10.1109/FDTC.2016.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/CnuddeN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016tis,
  editor       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Proceedings of the {ACM} Workshop on Theory of Implementation Security,
                  TIS@CCS 2016 Vienna, Austria, October, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2996366},
  doi          = {10.1145/2996366},
  isbn         = {978-1-4503-4575-0},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2016tis.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/waifi/2016,
  editor       = {Sylvain Duquesne and
                  Svetla Petkova{-}Nikova},
  title        = {Arithmetic of Finite Fields - 6th International Workshop, {WAIFI}
                  2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10064},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-55227-9},
  doi          = {10.1007/978-3-319-55227-9},
  isbn         = {978-3-319-55226-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CnuddeRBNNR16,
  author       = {Thomas De Cnudde and
                  Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Masking {AES} with d+1 Shares in Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/631},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CnuddeRBNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CnuddeBGNNR16,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen},
  title        = {Does Coupling Affect the Security of Masked Implementations?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1080},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1080},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BilginNNRTV15,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Natalia N. Tokareva and
                  Valeriya Vitkup},
  title        = {Threshold implementations of small S-boxes},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {3--33},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0104-7},
  doi          = {10.1007/S12095-014-0104-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BilginNNRTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcad/BilginGNNR15,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Trade-Offs for Threshold Implementations Illustrated on {AES}},
  journal      = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.},
  volume       = {34},
  number       = {7},
  pages        = {1188--1200},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCAD.2015.2419623},
  doi          = {10.1109/TCAD.2015.2419623},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcad/BilginGNNR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balkancryptsec/IvanovNN15,
  author       = {Georgi Ivanov and
                  Nikolay Nikolov and
                  Svetla Nikova},
  editor       = {Enes Pasalic and
                  Lars R. Knudsen},
  title        = {Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm},
  booktitle    = {Cryptography and Information Security in the Balkans - Second International
                  Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9540},
  pages        = {31--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29172-7\_3},
  doi          = {10.1007/978-3-319-29172-7\_3},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/IvanovNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/CnuddeBRNN15,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Oscar Reparaz and
                  Ventzislav Nikov and
                  Svetla Nikova},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Higher-Order Threshold Implementation of the {AES} S-Box},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {259--272},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_16},
  doi          = {10.1007/978-3-319-31271-2\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/CnuddeBRNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BilginKNN15,
  author       = {Beg{\"{u}}l Bilgin and
                  Miroslav Knezevic and
                  Ventzislav Nikov and
                  Svetla Nikova},
  editor       = {Naofumi Homma and
                  Marcel Medwed},
  title        = {Compact Implementations of Multi-Sbox Designs},
  booktitle    = {Smart Card Research and Advanced Applications - 14th International
                  Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9514},
  pages        = {273--285},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31271-2\_17},
  doi          = {10.1007/978-3-319-31271-2\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BilginKNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ReparazBNGV15,
  author       = {Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Consolidating Masking Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {764--783},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_37},
  doi          = {10.1007/978-3-662-47989-6\_37},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ReparazBNGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgievichGKNPRST15,
  author       = {Sergey Agievich and
                  Anastasiya Gorodilova and
                  Nikolay Kolomeec and
                  Svetla Nikova and
                  Bart Preneel and
                  Vincent Rijmen and
                  George Shushuev and
                  Natalia N. Tokareva and
                  Valeriya Vitkup},
  title        = {Problems, solutions and experience of the first international student's
                  Olympiad in cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {534},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/534},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ReparazBNGV15,
  author       = {Oscar Reparaz and
                  Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Benedikt Gierlichs and
                  Ingrid Verbauwhede},
  title        = {Consolidating masking schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {719},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/719},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ReparazBNGV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/GongHNTZ14,
  author       = {Zheng Gong and
                  Pieter H. Hartel and
                  Svetla Nikova and
                  Shaohua Tang and
                  Bo Zhu},
  title        = {TuLP: {A} Family of Lightweight Message Authentication Codes for Body
                  Sensor Networks},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {29},
  number       = {1},
  pages        = {53--68},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11390-013-1411-8},
  doi          = {10.1007/S11390-013-1411-8},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/GongHNTZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {A More Efficient {AES} Threshold Implementation},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {267--284},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_17},
  doi          = {10.1007/978-3-319-06734-6\_17},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Higher-Order Threshold Implementations},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_18},
  doi          = {10.1007/978-3-662-45608-8\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/balkancryptsec/CnuddeBRN14,
  author       = {Thomas De Cnudde and
                  Beg{\"{u}}l Bilgin and
                  Oscar Reparaz and
                  Svetla Nikova},
  editor       = {Berna {\"{O}}rs and
                  Bart Preneel},
  title        = {Higher-Order Glitch Resistant Implementation of the {PRESENT} S-Box},
  booktitle    = {Cryptography and Information Security in the Balkans - First International
                  Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17,
                  2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9024},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-21356-9\_6},
  doi          = {10.1007/978-3-319-21356-9\_6},
  timestamp    = {Tue, 16 Nov 2021 09:08:54 +0100},
  biburl       = {https://dblp.org/rec/conf/balkancryptsec/CnuddeBRN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginGNNR14,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {Higher-Order Threshold Implementations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {751},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/751},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginGNNR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IvanovNN14,
  author       = {Georgi Ivanov and
                  Nikolay Nikolov and
                  Svetla Nikova},
  title        = {Reversed Genetic Algorithms for Generation of Bijective S-boxes with
                  Good Cryptographic Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {801},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/801},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IvanovNN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/LopezNPPP13,
  author       = {Javier L{\'{o}}pez and
                  Svetla Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul and
                  Bart Preneel},
  title        = {Preface},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {5},
  pages        = {747},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2013.02.001},
  doi          = {10.1016/J.CAMWA.2013.02.001},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cma/LopezNPPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BilginDNNRA13,
  author       = {Beg{\"{u}}l Bilgin and
                  Joan Daemen and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen and
                  Gilles Van Assche},
  editor       = {Aur{\'{e}}lien Francillon and
                  Pankaj Rohatgi},
  title        = {Efficient and First-Order {DPA} Resistant Implementations of Keccak},
  booktitle    = {Smart Card Research and Advanced Applications - 12th International
                  Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013.
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8419},
  pages        = {187--199},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-08302-5\_13},
  doi          = {10.1007/978-3-319-08302-5\_13},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BilginDNNRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginGNNR13,
  author       = {Beg{\"{u}}l Bilgin and
                  Benedikt Gierlichs and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen},
  title        = {A More Efficient {AES} Threshold Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/697},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginGNNR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/BilginNNRS12,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Georg St{\"{u}}tz},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Threshold Implementations of All 3 {\texttimes}3 and 4 {\texttimes}4
                  S-Boxes},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {76--91},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_5},
  doi          = {10.1007/978-3-642-33027-8\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/BilginNNRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2011,
  editor       = {Svetla Petkova{-}Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul},
  title        = {Public Key Infrastructures, Services and Applications - 8th European
                  Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7163},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29804-2},
  doi          = {10.1007/978-3-642-29804-2},
  isbn         = {978-3-642-29803-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BilginNNRS12,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Georg St{\"{u}}tz},
  title        = {Threshold Implementations of all 3x3 and 4x4 S-boxes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {300},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/300},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BilginNNRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/NikovaRS11,
  author       = {Svetla Nikova and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  title        = {Secure Hardware Implementation of Nonlinear Functions in the Presence
                  of Glitches},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {2},
  pages        = {292--321},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9085-7},
  doi          = {10.1007/S00145-010-9085-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/NikovaRS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/IbraimiNHJ11,
  author       = {Luan Ibraimi and
                  Svetla Nikova and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Public-Key Encryption with Delegated Search},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {532--549},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_31},
  doi          = {10.1007/978-3-642-21554-4\_31},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/IbraimiNHJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SedghiHJN11,
  author       = {Saeed Sedghi and
                  Pieter H. Hartel and
                  Willem Jonker and
                  Svetla Nikova},
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Privacy Enhanced Access Control by Means of Policy Blinding},
  booktitle    = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  pages        = {108--122},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0\_9},
  doi          = {10.1007/978-3-642-21031-0\_9},
  timestamp    = {Tue, 12 May 2020 10:56:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SedghiHJN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/GongNL11,
  author       = {Zheng Gong and
                  Svetla Nikova and
                  Yee Wei Law},
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {{KLEIN:} {A} New Family of Lightweight Block Ciphers},
  booktitle    = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25286-0\_1},
  doi          = {10.1007/978-3-642-25286-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/GongNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeuleEKKNPSS10,
  author       = {Jan De Beule and
                  Yves Edel and
                  Emilia K{\"{a}}sper and
                  Andreas Klein and
                  Svetla Nikova and
                  Bart Preneel and
                  Jeroen Schillewaert and
                  Leo Storme},
  title        = {Galois geometries and applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {56},
  number       = {2-3},
  pages        = {85--86},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9410-z},
  doi          = {10.1007/S10623-010-9410-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeuleEKKNPSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarretoNNRT10,
  author       = {Paulo S. L. M. Barreto and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Vincent Rijmen and
                  Elmar Tischhauser},
  title        = {Whirlwind: a new cryptographic hash function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {56},
  number       = {2-3},
  pages        = {141--162},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9391-y},
  doi          = {10.1007/S10623-010-9391-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarretoNNRT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/SedghiLNHJ10,
  author       = {Saeed Sedghi and
                  Peter van Liesdonk and
                  Svetla Nikova and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Searching Keywords with Wildcards on Encrypted Data},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {138--153},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_10},
  doi          = {10.1007/978-3-642-15317-4\_10},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/SedghiLNHJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GongHNZ09,
  author       = {Zheng Gong and
                  Pieter H. Hartel and
                  Svetla Nikova and
                  Bo Zhu},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Towards Secure and Practical MACs for Body Sensor Networks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_13},
  doi          = {10.1007/978-3-642-10628-6\_13},
  timestamp    = {Mon, 15 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GongHNZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IbraimiPNHJ09,
  author       = {Luan Ibraimi and
                  Milan Petkovic and
                  Svetla Nikova and
                  Pieter H. Hartel and
                  Willem Jonker},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_23},
  doi          = {10.1007/978-3-642-10838-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IbraimiPNHJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/natosec/NikovaN09,
  author       = {Svetla Nikova and
                  Ventzislav Nikov},
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {Secret Sharing and Error Correcting},
  booktitle    = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  pages        = {28--38},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {https://doi.org/10.3233/978-1-60750-002-5-28},
  doi          = {10.3233/978-1-60750-002-5-28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/NikovaN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/natosec/23,
  editor       = {Bart Preneel and
                  Stefan M. Dodunekov and
                  Vincent Rijmen and
                  Svetla Nikova},
  title        = {Enhancing Cryptographic Primitives with Techniques from Error Correcting
                  Codes},
  series       = {{NATO} Science for Peace and Security Series - {D:} Information and
                  Communication Security},
  volume       = {23},
  publisher    = {{IOS} Press},
  year         = {2009},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=12139},
  isbn         = {978-1-60750-002-5},
  timestamp    = {Wed, 11 May 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/natosec/23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/IndesteegeACDKN09,
  author       = {Sebastiaan Indesteege and
                  Elena Andreeva and
                  Christophe De Canni{\`{e}}re and
                  Orr Dunkelman and
                  Emilia K{\"{a}}sper and
                  Svetla Nikova and
                  Bart Preneel and
                  Elmar Tischhauser},
  editor       = {Helena Handschuh and
                  Stefan Lucks and
                  Bart Preneel and
                  Phillip Rogaway},
  title        = {The Lane hash function},
  booktitle    = {Symmetric Cryptography, 11.01. - 16.01.2009},
  series       = {Dagstuhl Seminar Proceedings},
  volume       = {09031},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany},
  year         = {2009},
  url          = {http://drops.dagstuhl.de/opus/volltexte/2009/1952/},
  timestamp    = {Thu, 10 Jun 2021 13:02:06 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/IndesteegeACDKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NikovaRS08,
  author       = {Svetla Nikova and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {Secure Hardware Implementation of Non-linear Functions in the Presence
                  of Glitches},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {218--234},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_14},
  doi          = {10.1007/978-3-642-00730-9\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NikovaRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NikovaRS08,
  author       = {Svetla Nikova and
                  Vincent Rijmen and
                  Martin Schl{\"{a}}ffer},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {Using Normal Bases for Compact Hardware Implementations of the {AES}
                  S-Box},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {236--245},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_16},
  doi          = {10.1007/978-3-540-85855-3\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NikovaRS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KasperNN07,
  author       = {Emilia K{\"{a}}sper and
                  Ventzislav Nikov and
                  Svetla Nikova},
  editor       = {Yvo Desmedt},
  title        = {Strongly Multiplicative Hierarchical Threshold Secret Sharing},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {148--168},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_13},
  doi          = {10.1007/978-3-642-10230-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KasperNN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/NikovN07,
  author       = {Ventzislav Nikov and
                  Svetla Nikova},
  title        = {A Modification of Jarecki and Saxena Proactive {RSA} Signature Scheme},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {1026--1029},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557117},
  doi          = {10.1109/ISIT.2007.4557117},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/NikovN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorissovLN07,
  author       = {Yuri L. Borissov and
                  Moon Ho Lee and
                  Svetla Nikova},
  title        = {On Asymptotic Behavior of the Ratio Between the Numbers of Binary
                  Primitive and Irreducible Polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {301},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/301},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorissovLN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BraekenBNP06,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Classification of cubic (n-4)-resilient Boolean functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {4},
  pages        = {1670--1676},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.871063},
  doi          = {10.1109/TIT.2006.871063},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BraekenBNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NikovNP06,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {348--363},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_23},
  doi          = {10.1007/11935230\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NikovNP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NikovaRR06,
  author       = {Svetla Nikova and
                  Christian Rechberger and
                  Vincent Rijmen},
  editor       = {Peng Ning and
                  Sihan Qing and
                  Ninghui Li},
  title        = {Threshold Implementations Against Side-Channel Attacks and Glitches},
  booktitle    = {Information and Communications Security, 8th International Conference,
                  {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4307},
  pages        = {529--545},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935308\_38},
  doi          = {10.1007/11935308\_38},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/NikovaRR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenNN06,
  author       = {An Braeken and
                  Ventzislav Nikov and
                  Svetla Nikova},
  title        = {On Zigzag Functions and Related Objects in New Metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {437},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/437},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenNN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YuBorissovBNP05,
  author       = {Yuri L. Borissov and
                  An Braeken and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {On the covering radii of binary Reed-Muller codes in the set of resilient
                  Boolean functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {3},
  pages        = {1182--1189},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2004.842779},
  doi          = {10.1109/TIT.2004.842779},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/YuBorissovBNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/BraekenNN05,
  author       = {An Braeken and
                  Ventzislav Nikov and
                  Svetla Nikova},
  editor       = {Lusheng Wang},
  title        = {Error-Set Codes and Related Objects},
  booktitle    = {Computing and Combinatorics, 11th Annual International Conference,
                  {COCOON} 2005, Kunming, China, August 16-29, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3595},
  pages        = {577--585},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11533719\_59},
  doi          = {10.1007/11533719\_59},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/BraekenNN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/BraekenBNP05,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Lu{\'{\i}}s Caires and
                  Giuseppe F. Italiano and
                  Lu{\'{\i}}s Monteiro and
                  Catuscia Palamidessi and
                  Moti Yung},
  title        = {Classification of Boolean Functions of 6 Variables or Less with Respect
                  to Some Cryptographic Properties},
  booktitle    = {Automata, Languages and Programming, 32nd International Colloquium,
                  {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3580},
  pages        = {324--334},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11523468\_27},
  doi          = {10.1007/11523468\_27},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/BraekenBNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcc/NikovN05,
  author       = {Ventzislav Nikov and
                  Svetla Nikova},
  editor       = {{\O}yvind Ytrehus},
  title        = {On a Relation Between Verifiable Secret Sharing Schemes and a Class
                  of Error-Correcting Codes},
  booktitle    = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen,
                  Norway, March 14-18, 2005. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3969},
  pages        = {275--290},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11779360\_22},
  doi          = {10.1007/11779360\_22},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wcc/NikovN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenBNP05,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Classification of Cubic (n-4)-resilient Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/332},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenBNP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/NikovNP04,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Robust Metering Schemes for General Access Structures},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {53--65},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_5},
  doi          = {10.1007/978-3-540-30191-2\_5},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/NikovNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BraekenNNP04,
  author       = {An Braeken and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {On Boolean Functions with Generalized Cryptographic Properties},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {120--135},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_11},
  doi          = {10.1007/978-3-540-30556-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BraekenNNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/NikovN04,
  author       = {Ventzislav Nikov and
                  Svetla Nikova},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {On Proactive Secret Sharing Schemes},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {308--325},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_22},
  doi          = {10.1007/978-3-540-30564-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/NikovN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NikovNP04,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {On the Size of Monotone Span Programs},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {249--262},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_18},
  doi          = {10.1007/978-3-540-30598-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NikovNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenNN04,
  author       = {An Braeken and
                  Svetla Nikova and
                  Ventzislav Nikov},
  title        = {On Cheating Immune Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {200},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/200},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenNN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BorissovBN04,
  author       = {Yuri L. Borissov and
                  An Braeken and
                  Svetla Nikova},
  title        = {Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set
                  of Resilient Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BorissovBN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenBNP04,
  author       = {An Braeken and
                  Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Classification of Boolean Functions of 6 Variables or Less with Respect
                  to Cryptographic Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenBNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BraekenNNP04,
  author       = {An Braeken and
                  Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {On Boolean Functions with Generalized Cryptographic Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {259},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/259},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BraekenNNP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovN04,
  author       = {Ventzislav Nikov and
                  Svetla Nikova},
  title        = {New Monotone Span Programs from Old},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/282},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/BorissovMN03,
  author       = {Yuri L. Borissov and
                  Nikolai L. Manev and
                  Svetla Nikova},
  title        = {On the Non-minimal Codewords in Binary Reed-Muller Codes},
  journal      = {Discret. Appl. Math.},
  volume       = {128},
  number       = {1},
  pages        = {65--74},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0166-218X(02)00436-5},
  doi          = {10.1016/S0166-218X(02)00436-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dam/BorissovMN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NikovaN03,
  author       = {Svetla Nikova and
                  Ventzislav Nikov},
  title        = {Improvement of the Delsarte Bound for t-Designs When It Is Not the
                  Best Bound Possible},
  journal      = {Des. Codes Cryptogr.},
  volume       = {28},
  number       = {2},
  pages        = {201--222},
  year         = {2003},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NikovaN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NikovNP03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally
                  Secure against Adaptive Adversary: The Zero-Error Case},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_1},
  doi          = {10.1007/978-3-540-45203-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NikovNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BorissovBNP03,
  author       = {Yuri L. Borissov and
                  An Braeken and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Kenneth G. Paterson},
  title        = {On the Covering Radius of Second Order Binary Reed-Muller Code in
                  the Set of Resilient Boolean Functions},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {82--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_8},
  doi          = {10.1007/978-3-540-40974-8\_8},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BorissovBNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NikovNP03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {On Multiplicative Linear Secret Sharing Schemes},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {135--147},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_10},
  doi          = {10.1007/978-3-540-24582-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NikovNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNP03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel},
  title        = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure
                  against Adaptive Adversary: The Zero-Error Case},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/006},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovN03,
  author       = {Ventzislav Nikov and
                  Svetla Nikova},
  title        = {On a Relation Between Verifiable Secret Sharing Schemes and a Class
                  of Error-Correcting Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NikovNPV02,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {On Unconditionally Secure Distributed Oblivious Transfer},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {395--408},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_31},
  doi          = {10.1007/3-540-36231-2\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NikovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NikovNPV02a,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {On Distributed Key Distribution Centers and Unconditionally Secure
                  Proactive Verifiable Secret Sharing Schemes Based on General Access
                  Structure},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {422--436},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_33},
  doi          = {10.1007/3-540-36231-2\_33},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NikovNPV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BorissovNPV02,
  author       = {Yuri L. Borissov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {On a Resynchronization Weakness in a Class of Combiners with Memory},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {164--173},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_12},
  doi          = {10.1007/3-540-36413-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BorissovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNPV02,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Applying General Access Structure to Metering Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {102},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/102},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNPV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NikovNPV02a,
  author       = {Ventzislav Nikov and
                  Svetla Nikova and
                  Bart Preneel and
                  Joos Vandewalle},
  title        = {Applying General Access Structure to Proactive Secret Sharing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {141},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/141},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NikovNPV02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/BorissovMN01,
  author       = {Yuri L. Borissov and
                  Nikolai L. Manev and
                  Svetla Nikova},
  title        = {On the Non-Minimal codewords of weight 2d\({}_{\mbox{min}}\) in the
                  binary Reed-Muller Code},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {548--555},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00207-0},
  doi          = {10.1016/S1571-0653(04)00207-0},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/BorissovMN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/NikovaN01,
  author       = {Svetla Nikova and
                  Ventzislav Nikov},
  editor       = {Bahram Honary},
  title        = {Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial
                  Metric Spaces},
  booktitle    = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester,
                  UK, December 17-19, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2260},
  pages        = {191--204},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45325-3\_18},
  doi          = {10.1007/3-540-45325-3\_18},
  timestamp    = {Wed, 18 Mar 2020 16:01:01 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/NikovaN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcg/BoyvalenkovDN99,
  author       = {Peter G. Boyvalenkov and
                  Danyo Danev and
                  Svetla Nikova},
  title        = {Nonexistence of Certain Spherical Designs of Odd Strengths and Cardinalities},
  journal      = {Discret. Comput. Geom.},
  volume       = {21},
  number       = {1},
  pages        = {143--156},
  year         = {1999},
  url          = {https://doi.org/10.1007/PL00009406},
  doi          = {10.1007/PL00009406},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcg/BoyvalenkovDN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/NikovaN99,
  author       = {Svetla Nikova and
                  Ventzislav Nikov},
  editor       = {Michael Walker},
  title        = {Some Applications of Bounds for Designs to the Cryptography},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {25--34},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_2},
  doi          = {10.1007/3-540-46665-7\_2},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/NikovaN99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fiwac/BoyvalenkovN93,
  author       = {Peter G. Boyvalenkov and
                  Svetla Nikova},
  editor       = {G{\'{e}}rard D. Cohen and
                  Simon Litsyn and
                  Antoine Lobstein and
                  Gilles Z{\'{e}}mor},
  title        = {New lower bounds for some spherical designs},
  booktitle    = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July
                  19-21, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {781},
  pages        = {207--216},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57843-9\_21},
  doi          = {10.1007/3-540-57843-9\_21},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fiwac/BoyvalenkovN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics