Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Svetla Nikova
@article{DBLP:journals/tches/HirataMALMNS24, author = {Haruka Hirata and Daiki Miyahara and Victor Arribas and Yang Li and Noriyuki Miura and Svetla Nikova and Kazuo Sakiyama}, title = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection M{\&}M}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {133--156}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.133-156}, doi = {10.46586/TCHES.V2024.I1.133-156}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/HirataMALMNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AskelandNN24, author = {Amund Askeland and Svetla Nikova and Ventzislav Nikov}, title = {Who Watches the Watchers: Attacking Glitch Detection Circuits}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {157--179}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.157-179}, doi = {10.46586/TCHES.V2024.I1.157-179}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/AskelandNN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ToprakhisarNN24, author = {Dilara Toprakhisar and Svetla Nikova and Ventzislav Nikov}, title = {{CAPABARA:} {A} Combined Attack on {CAPA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2024}, url = {https://eprint.iacr.org/2024/287}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ToprakhisarNN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ToprakhisarNN24a, author = {Dilara Toprakhisar and Svetla Nikova and Ventzislav Nikov}, title = {SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {289}, year = {2024}, url = {https://eprint.iacr.org/2024/289}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ToprakhisarNN24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SarencheZNP24, author = {Roozbeh Sarenche and Ren Zhang and Svetla Nikova and Bart Preneel}, title = {Time-Averaged Analysis of Selfish Mining in Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {363}, year = {2024}, url = {https://eprint.iacr.org/2024/363}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SarencheZNP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PiccioneABCDNPR23, author = {Enrico Piccione and Samuele Andreoli and Lilya Budaghyan and Claude Carlet and Siemen Dhooghe and Svetla Nikova and George Petrides and Vincent Rijmen}, title = {An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {10}, pages = {6700--6710}, year = {2023}, url = {https://doi.org/10.1109/TIT.2023.3287534}, doi = {10.1109/TIT.2023.3287534}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/PiccioneABCDNPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/DhoogheN23, author = {Siemen Dhooghe and Svetla Nikova}, editor = {Claude Carlet and Kalikinkar Mandal and Vincent Rijmen}, title = {The Random Fault Model}, booktitle = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14201}, pages = {191--212}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53368-6\_10}, doi = {10.1007/978-3-031-53368-6\_10}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/DhoogheN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirataMALMNS23, author = {Haruka Hirata and Daiki Miyahara and Victor Arribas and Yang Li and Noriyuki Miura and Svetla Nikova and Kazuo Sakiyama}, title = {All You Need Is Fault: Zero-Value Attacks on {AES} and a New {\(\lambda\)}-Detection M{\&}M}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1129}, year = {2023}, url = {https://eprint.iacr.org/2023/1129}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirataMALMNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreoliPBSN23, author = {Samuele Andreoli and Enrico Piccione and Lilya Budaghyan and Pantelimon Stanica and Svetla Nikova}, title = {On Decompositions of Permutations in Quadratic Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1632}, year = {2023}, url = {https://eprint.iacr.org/2023/1632}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AndreoliPBSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AskelandNN23, author = {Amund Askeland and Svetla Nikova and Ventzislav Nikov}, title = {Who Watches the Watchers: Attacking Glitch Detection Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1647}, year = {2023}, url = {https://eprint.iacr.org/2023/1647}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AskelandNN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DhoogheN22, author = {Siemen Dhooghe and Svetla Nikova}, title = {Resilient uniformity: applying resiliency in masking}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {41--58}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00515-w}, doi = {10.1007/S12095-021-00515-W}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DhoogheN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AskelandDNRZ22, author = {Amund Askeland and Siemen Dhooghe and Svetla Nikova and Vincent Rijmen and Zhenda Zhang}, editor = {Ileana Buhan and Tobias Schneider}, title = {Guarding the First Order: The Rise of {AES} Maskings}, booktitle = {Smart Card Research and Advanced Applications - 21st International Conference, {CARDIS} 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13820}, pages = {103--122}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-25319-5\_6}, doi = {10.1007/978-3-031-25319-5\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AskelandDNRZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isgt/ZobiriGND22, author = {Fairouz Zobiri and Mariana Gama and Svetla Nikova and Geert Deconinck}, title = {A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party Computation}, booktitle = {2022 {IEEE} Power {\&} Energy Society Innovative Smart Grid Technologies Conference, {ISGT} 2022, New Orleans, LA, USA, April 24-28, 2022}, pages = {1--5}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ISGT50606.2022.9817546}, doi = {10.1109/ISGT50606.2022.9817546}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isgt/ZobiriGND22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasZN22, author = {Victor Arribas and Zhenda Zhang and Svetla Nikova}, title = {{LLTI:} Low-Latency Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {418}, year = {2022}, url = {https://eprint.iacr.org/2022/418}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasZN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PiccioneABCDNPR22, author = {Enrico Piccione and Samuele Andreoli and Lilya Budaghyan and Claude Carlet and Siemen Dhooghe and Svetla Nikova and George Petrides and Vincent Rijmen}, title = {An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1141}, year = {2022}, url = {https://eprint.iacr.org/2022/1141}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PiccioneABCDNPR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ArribasZN21, author = {Victor Arribas and Zhenda Zhang and Svetla Nikova}, title = {{LLTI:} Low-Latency Threshold Implementations}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {5108--5123}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3123527}, doi = {10.1109/TIFS.2021.3123527}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ArribasZN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/FigueiredoMRNP21, author = {Sammy de Figueiredo and Akash Madhusudan and Vincent Reniers and Svetla Nikova and Bart Preneel}, editor = {Chih{-}Cheng Hung and Jiman Hong and Alessio Bechini and Eunjee Song}, title = {Exploring the storj network: a security analysis}, booktitle = {{SAC} '21: The 36th {ACM/SIGAPP} Symposium on Applied Computing, Virtual Event, Republic of Korea, March 22-26, 2021}, pages = {257--264}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3412841.3441908}, doi = {10.1145/3412841.3441908}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/FigueiredoMRNP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhoogheNR21, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, title = {First-Order Hardware Sharings of the {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {734}, year = {2021}, url = {https://eprint.iacr.org/2021/734}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhoogheNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhoogheN21, author = {Siemen Dhooghe and Svetla Nikova}, title = {Resilient Uniformity: Applying Resiliency in Masking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1094}, year = {2021}, url = {https://eprint.iacr.org/2021/1094}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhoogheN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/DhoogheN20, author = {Siemen Dhooghe and Svetla Nikova}, editor = {Pierre{-}Yvan Liardet and Nele Mentens}, title = {Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries}, booktitle = {Smart Card Research and Advanced Applications - 19th International Conference, {CARDIS} 2020, Virtual Event, November 18-19, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12609}, pages = {181--195}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68487-7\_12}, doi = {10.1007/978-3-030-68487-7\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/DhoogheN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DhoogheN20, author = {Siemen Dhooghe and Svetla Nikova}, editor = {Stanislaw Jarecki}, title = {My Gadget Just Cares for Me - How {NINA} Can Prove Security Against Combined Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {35--55}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_3}, doi = {10.1007/978-3-030-40186-3\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/DhoogheN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/ArribasWMN20, author = {Victor Arribas and Felix Wegener and Amir Moradi and Svetla Nikova}, title = {Cryptographic Fault Diagnosis using VerFI}, booktitle = {2020 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2020, San Jose, CA, USA, December 7-11, 2020}, pages = {229--240}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/HOST45689.2020.9300264}, doi = {10.1109/HOST45689.2020.9300264}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/host/ArribasWMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/ReniersG00MLNLL20, author = {Vincent Reniers and Yuan Gao and Ren Zhang and Paolo Viviani and Akash Madhusudan and Bert Lagaisse and Svetla Nikova and Dimitri Van Landuyt and Riccardo Lombardi and Bart Preneel and Wouter Joosen}, editor = {Chih{-}Cheng Hung and Tom{\'{a}}s Cern{\'{y}} and Dongwan Shin and Alessio Bechini}, title = {Authenticated and auditable data sharing via smart contract}, booktitle = {{SAC} '20: The 35th {ACM/SIGAPP} Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30 - April 3, 2020}, pages = {324--331}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3341105.3373957}, doi = {10.1145/3341105.3373957}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/ReniersG00MLNLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-09563, author = {Anastasiya Gorodilova and Natalia N. Tokareva and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeria Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Roman Lebedev and Svetla Nikova and Alexey Oblaukhov and Irina Pankratova and Marina Pudovkina and Vincent Rijmen and Aleksei Udovenko}, title = {On the Sixth International Olympiad in Cryptography {NSUCRYPTO}}, journal = {CoRR}, volume = {abs/2005.09563}, year = {2020}, url = {https://arxiv.org/abs/2005.09563}, eprinttype = {arXiv}, eprint = {2005.09563}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-09563.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhoogheN20, author = {Siemen Dhooghe and Svetla Nikova}, title = {Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1146}, year = {2020}, url = {https://eprint.iacr.org/2020/1146}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhoogheN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NikovaNR19, author = {Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Decomposition of permutations in a finite field}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {379--384}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0317-2}, doi = {10.1007/S12095-018-0317-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NikovaNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/VariciNNR19, author = {Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Constructions of S-boxes with uniform sharing}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {385--398}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0345-y}, doi = {10.1007/S12095-018-0345-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/VariciNNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/GorodilovaACGIK19, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions from the fourth International Students' Olympiad in Cryptography {(NSUCRYPTO)}}, journal = {Cryptologia}, volume = {43}, number = {2}, pages = {138--174}, year = {2019}, url = {https://doi.org/10.1080/01611194.2018.1517834}, doi = {10.1080/01611194.2018.1517834}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/GorodilovaACGIK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/ArribasNR19, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {Guards in action: First-order {SCA} secure implementations of {KETJE} without additional randomness}, journal = {Microprocess. Microsystems}, volume = {71}, year = {2019}, url = {https://doi.org/10.1016/j.micpro.2019.102859}, doi = {10.1016/J.MICPRO.2019.102859}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mam/ArribasNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/MeyerANNR19, author = {Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {M{\&}M: Masks and Macs against Physical Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2019}, number = {1}, pages = {25--50}, year = {2019}, url = {https://doi.org/10.13154/tches.v2019.i1.25-50}, doi = {10.13154/TCHES.V2019.I1.25-50}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/MeyerANNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DhoogheNR19, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, editor = {Beg{\"{u}}l Bilgin and Svetla Petkova{-}Nikova and Vincent Rijmen}, title = {Threshold Implementations in the Robust Probing Model}, booktitle = {Proceedings of {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2019, London, UK, November 11, 2019}, pages = {30--37}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338467.3358949}, doi = {10.1145/3338467.3358949}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DhoogheNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BilginNR19, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {TIS'19: Theory of Implementation Security Workshop 2019}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2701--2702}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3353552}, doi = {10.1145/3319535.3353552}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BilginNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019tis, editor = {Beg{\"{u}}l Bilgin and Svetla Petkova{-}Nikova and Vincent Rijmen}, title = {Proceedings of {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2019, London, UK, November 11, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338467}, doi = {10.1145/3338467}, isbn = {978-1-4503-6827-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2019tis.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlyAN19, author = {Abdelrahaman Aly and Aysajan Abidin and Svetla Nikova}, title = {Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {334}, year = {2019}, url = {https://eprint.iacr.org/2019/334}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlyAN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhoogheN19, author = {Siemen Dhooghe and Svetla Nikova}, title = {My Gadget Just Cares For Me - How {NINA} Can Prove Security Against Combined Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2019}, url = {https://eprint.iacr.org/2019/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhoogheN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DhoogheNR19, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, title = {Threshold Implementations in the Robust Probing Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1005}, year = {2019}, url = {https://eprint.iacr.org/2019/1005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DhoogheNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasWMN19, author = {Victor Arribas and Felix Wegener and Amir Moradi and Svetla Nikova}, title = {Cryptographic Fault Diagnosis using VerFI}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1312}, year = {2019}, url = {https://eprint.iacr.org/2019/1312}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasWMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ArribasBPNR18, author = {Victor Arribas and Beg{\"{u}}l Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen}, title = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {1}, pages = {269--290}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i1.269-290}, doi = {10.13154/TCHES.V2018.I1.269-290}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ArribasBPNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ReparazMBANNS18, author = {Oscar Reparaz and Lauren De Meyer and Beg{\"{u}}l Bilgin and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Nigel P. Smart}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {{CAPA:} The Spirit of Beaver Against Physical Attacks}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {121--151}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_5}, doi = {10.1007/978-3-319-96884-1\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ReparazMBANNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsd/ArribasNR18, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, editor = {Martin Novotn{\'{y}} and Nikos Konofaos and Amund Skavhaug}, title = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje Without Additional Randomness}, booktitle = {21st Euromicro Conference on Digital System Design, {DSD} 2018, Prague, Czech Republic, August 29-31, 2018}, pages = {492--499}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/DSD.2018.00088}, doi = {10.1109/DSD.2018.00088}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsd/ArribasNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AlyAN18, author = {Abdelrahaman Aly and Aysajan Abidin and Svetla Nikova}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {291--309}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_16}, doi = {10.1007/978-3-662-58387-6\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/AlyAN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icecsys/ArribasNR18, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {VerMI: Verification Tool for Masked Implementations}, booktitle = {25th {IEEE} International Conference on Electronics, Circuits and Systems, {ICECS} 2018, Bordeaux, France, December 9-12, 2018}, pages = {381--384}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICECS.2018.8617841}, doi = {10.1109/ICECS.2018.8617841}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icecsys/ArribasNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-02059, author = {Anastasiya Gorodilova and Sergey Agievich and Claude Carlet and Evgeny Gorkunov and Valeriya Idrisova and Nikolay Kolomeec and Alexandr Kutsenko and Svetla Nikova and Alexey Oblaukhov and Stjepan Picek and Bart Preneel and Vincent Rijmen and Natalia N. Tokareva}, title = {Problems and solutions of the Fourth International Students' Olympiad in Cryptography {NSUCRYPTO}}, journal = {CoRR}, volume = {abs/1806.02059}, year = {2018}, url = {http://arxiv.org/abs/1806.02059}, eprinttype = {arXiv}, eprint = {1806.02059}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-02059.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/VariciNNR18, author = {Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Constructions of S-boxes with uniform sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2018}, url = {http://eprint.iacr.org/2018/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/VariciNNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovaNR18, author = {Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Decomposition of Permutations in a Finite Field}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2018}, url = {http://eprint.iacr.org/2018/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovaNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasNR18, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {Guards in Action: First-Order {SCA} Secure Implementations of Ketje without Additional Randomness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2018}, url = {https://eprint.iacr.org/2018/806}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MeyerANNR18, author = {Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {M{\&}M: Masks and Macs against Physical Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2018}, url = {https://eprint.iacr.org/2018/1195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MeyerANNR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/CnuddeN17, author = {Thomas De Cnudde and Svetla Nikova}, title = {Securing the {PRESENT} Block Cipher Against Combined Side-Channel Analysis and Fault Attacks}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {25}, number = {12}, pages = {3291--3301}, year = {2017}, url = {https://doi.org/10.1109/TVLSI.2017.2713483}, doi = {10.1109/TVLSI.2017.2713483}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/CnuddeN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AshurDLMMNRRS0P17, author = {Tomer Ashur and Jeroen Delvaux and Sanghan Lee and Pieter Maene and Eduard Marin and Svetla Nikova and Oscar Reparaz and Vladimir Rozic and Dave Singel{\'{e}}e and Bohan Yang and Bart Preneel}, editor = {Srdjan Capkun and Sherman S. M. Chow}, title = {A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network}, booktitle = {Cryptology and Network Security - 16th International Conference, {CANS} 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11261}, pages = {347--369}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-02641-7\_16}, doi = {10.1007/978-3-030-02641-7\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/AshurDLMMNRRS0P17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/CnuddeBGNNR17, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, editor = {Sylvain Guilley}, title = {Does Coupling Affect the Security of Masked Implementations?}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 8th International Workshop, {COSADE} 2017, Paris, France, April 13-14, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10348}, pages = {1--18}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64647-3\_1}, doi = {10.1007/978-3-319-64647-3\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/CnuddeBGNNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasBPNR17, author = {Victor Arribas and Beg{\"{u}}l Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen}, title = {Rhythmic Keccak: {SCA} Security and Low Latency in {HW}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1193}, year = {2017}, url = {http://eprint.iacr.org/2017/1193}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasBPNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazMBANNS17, author = {Oscar Reparaz and Lauren De Meyer and Beg{\"{u}}l Bilgin and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Nigel P. Smart}, title = {{CAPA:} The Spirit of Beaver against Physical Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1195}, year = {2017}, url = {http://eprint.iacr.org/2017/1195}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazMBANNS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArribasNR17, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {VerMI: Verification Tool for Masked Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2017}, url = {http://eprint.iacr.org/2017/1227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArribasNR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/IvanovNN16, author = {Georgi Ivanov and Nikolay Nikolov and Svetla Nikova}, title = {Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {247--276}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0170-5}, doi = {10.1007/S12095-015-0170-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/IvanovNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Masking {AES} With d+1 Shares in Hardware}, booktitle = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, pages = {43}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366.2996428}, doi = {10.1145/2996366.2996428}, timestamp = {Sat, 30 Sep 2023 09:36:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BilginNR16, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Theory of Implementation Security Workshop (TIs 2016)}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1875--1876}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2990488}, doi = {10.1145/2976749.2990488}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BilginNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {Masking {AES} with d+1 Shares in Hardware}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {194--212}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_10}, doi = {10.1007/978-3-662-53140-2\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/CnuddeN16, author = {Thomas De Cnudde and Svetla Nikova}, title = {More Efficient Private Circuits {II} through Threshold Implementations}, booktitle = {2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2016, Santa Barbara, CA, USA, August 16, 2016}, pages = {114--124}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/FDTC.2016.15}, doi = {10.1109/FDTC.2016.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/CnuddeN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016tis, editor = {Beg{\"{u}}l Bilgin and Svetla Nikova and Vincent Rijmen}, title = {Proceedings of the {ACM} Workshop on Theory of Implementation Security, TIS@CCS 2016 Vienna, Austria, October, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2996366}, doi = {10.1145/2996366}, isbn = {978-1-4503-4575-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2016tis.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/waifi/2016, editor = {Sylvain Duquesne and Svetla Petkova{-}Nikova}, title = {Arithmetic of Finite Fields - 6th International Workshop, {WAIFI} 2016, Ghent, Belgium, July 13-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10064}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-55227-9}, doi = {10.1007/978-3-319-55227-9}, isbn = {978-3-319-55226-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CnuddeRBNNR16, author = {Thomas De Cnudde and Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Masking {AES} with d+1 Shares in Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2016}, url = {http://eprint.iacr.org/2016/631}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CnuddeRBNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CnuddeBGNNR16, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, title = {Does Coupling Affect the Security of Masked Implementations?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1080}, year = {2016}, url = {http://eprint.iacr.org/2016/1080}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CnuddeBGNNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BilginNNRTV15, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Natalia N. Tokareva and Valeriya Vitkup}, title = {Threshold implementations of small S-boxes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {3--33}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0104-7}, doi = {10.1007/S12095-014-0104-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BilginNNRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcad/BilginGNNR15, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Trade-Offs for Threshold Implementations Illustrated on {AES}}, journal = {{IEEE} Trans. Comput. Aided Des. Integr. Circuits Syst.}, volume = {34}, number = {7}, pages = {1188--1200}, year = {2015}, url = {https://doi.org/10.1109/TCAD.2015.2419623}, doi = {10.1109/TCAD.2015.2419623}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcad/BilginGNNR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balkancryptsec/IvanovNN15, author = {Georgi Ivanov and Nikolay Nikolov and Svetla Nikova}, editor = {Enes Pasalic and Lars R. Knudsen}, title = {Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm}, booktitle = {Cryptography and Information Security in the Balkans - Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9540}, pages = {31--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-29172-7\_3}, doi = {10.1007/978-3-319-29172-7\_3}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/balkancryptsec/IvanovNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CnuddeBRNN15, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Oscar Reparaz and Ventzislav Nikov and Svetla Nikova}, editor = {Naofumi Homma and Marcel Medwed}, title = {Higher-Order Threshold Implementation of the {AES} S-Box}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {259--272}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_16}, doi = {10.1007/978-3-319-31271-2\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CnuddeBRNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BilginKNN15, author = {Beg{\"{u}}l Bilgin and Miroslav Knezevic and Ventzislav Nikov and Svetla Nikova}, editor = {Naofumi Homma and Marcel Medwed}, title = {Compact Implementations of Multi-Sbox Designs}, booktitle = {Smart Card Research and Advanced Applications - 14th International Conference, {CARDIS} 2015, Bochum, Germany, November 4-6, 2015. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9514}, pages = {273--285}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31271-2\_17}, doi = {10.1007/978-3-319-31271-2\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BilginKNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ReparazBNGV15, author = {Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Consolidating Masking Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {764--783}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_37}, doi = {10.1007/978-3-662-47989-6\_37}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ReparazBNGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgievichGKNPRST15, author = {Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia N. Tokareva and Valeriya Vitkup}, title = {Problems, solutions and experience of the first international student's Olympiad in cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {534}, year = {2015}, url = {http://eprint.iacr.org/2015/534}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgievichGKNPRST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ReparazBNGV15, author = {Oscar Reparaz and Beg{\"{u}}l Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Consolidating masking schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {719}, year = {2015}, url = {http://eprint.iacr.org/2015/719}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ReparazBNGV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/GongHNTZ14, author = {Zheng Gong and Pieter H. Hartel and Svetla Nikova and Shaohua Tang and Bo Zhu}, title = {TuLP: {A} Family of Lightweight Message Authentication Codes for Body Sensor Networks}, journal = {J. Comput. Sci. Technol.}, volume = {29}, number = {1}, pages = {53--68}, year = {2014}, url = {https://doi.org/10.1007/s11390-013-1411-8}, doi = {10.1007/S11390-013-1411-8}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/GongHNTZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {David Pointcheval and Damien Vergnaud}, title = {A More Efficient {AES} Threshold Implementation}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {267--284}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_17}, doi = {10.1007/978-3-319-06734-6\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Higher-Order Threshold Implementations}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {326--343}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_18}, doi = {10.1007/978-3-662-45608-8\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/balkancryptsec/CnuddeBRN14, author = {Thomas De Cnudde and Beg{\"{u}}l Bilgin and Oscar Reparaz and Svetla Nikova}, editor = {Berna {\"{O}}rs and Bart Preneel}, title = {Higher-Order Glitch Resistant Implementation of the {PRESENT} S-Box}, booktitle = {Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9024}, pages = {75--93}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-21356-9\_6}, doi = {10.1007/978-3-319-21356-9\_6}, timestamp = {Tue, 16 Nov 2021 09:08:54 +0100}, biburl = {https://dblp.org/rec/conf/balkancryptsec/CnuddeBRN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginGNNR14, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Higher-Order Threshold Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {751}, year = {2014}, url = {http://eprint.iacr.org/2014/751}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginGNNR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IvanovNN14, author = {Georgi Ivanov and Nikolay Nikolov and Svetla Nikova}, title = {Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {801}, year = {2014}, url = {http://eprint.iacr.org/2014/801}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IvanovNN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/LopezNPPP13, author = {Javier L{\'{o}}pez and Svetla Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul and Bart Preneel}, title = {Preface}, journal = {Comput. Math. Appl.}, volume = {65}, number = {5}, pages = {747}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2013.02.001}, doi = {10.1016/J.CAMWA.2013.02.001}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/LopezNPPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/BilginDNNRA13, author = {Beg{\"{u}}l Bilgin and Joan Daemen and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen and Gilles Van Assche}, editor = {Aur{\'{e}}lien Francillon and Pankaj Rohatgi}, title = {Efficient and First-Order {DPA} Resistant Implementations of Keccak}, booktitle = {Smart Card Research and Advanced Applications - 12th International Conference, {CARDIS} 2013, Berlin, Germany, November 27-29, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8419}, pages = {187--199}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-08302-5\_13}, doi = {10.1007/978-3-319-08302-5\_13}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cardis/BilginDNNRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginGNNR13, author = {Beg{\"{u}}l Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {A More Efficient {AES} Threshold Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2013}, url = {http://eprint.iacr.org/2013/697}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginGNNR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BilginNNRS12, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg St{\"{u}}tz}, editor = {Emmanuel Prouff and Patrick Schaumont}, title = {Threshold Implementations of All 3 {\texttimes}3 and 4 {\texttimes}4 S-Boxes}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7428}, pages = {76--91}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33027-8\_5}, doi = {10.1007/978-3-642-33027-8\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BilginNNRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/europki/2011, editor = {Svetla Petkova{-}Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul}, title = {Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7163}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29804-2}, doi = {10.1007/978-3-642-29804-2}, isbn = {978-3-642-29803-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BilginNNRS12, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Georg St{\"{u}}tz}, title = {Threshold Implementations of all 3x3 and 4x4 S-boxes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {300}, year = {2012}, url = {http://eprint.iacr.org/2012/300}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BilginNNRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/NikovaRS11, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, title = {Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches}, journal = {J. Cryptol.}, volume = {24}, number = {2}, pages = {292--321}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9085-7}, doi = {10.1007/S00145-010-9085-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/NikovaRS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/IbraimiNHJ11, author = {Luan Ibraimi and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Public-Key Encryption with Delegated Search}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {532--549}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_31}, doi = {10.1007/978-3-642-21554-4\_31}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/IbraimiNHJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SedghiHJN11, author = {Saeed Sedghi and Pieter H. Hartel and Willem Jonker and Svetla Nikova}, editor = {Feng Bao and Jian Weng}, title = {Privacy Enhanced Access Control by Means of Policy Blinding}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {108--122}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_9}, doi = {10.1007/978-3-642-21031-0\_9}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SedghiHJN11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/GongNL11, author = {Zheng Gong and Svetla Nikova and Yee Wei Law}, editor = {Ari Juels and Christof Paar}, title = {{KLEIN:} {A} New Family of Lightweight Block Ciphers}, booktitle = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, pages = {1--18}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25286-0\_1}, doi = {10.1007/978-3-642-25286-0\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/GongNL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeuleEKKNPSS10, author = {Jan De Beule and Yves Edel and Emilia K{\"{a}}sper and Andreas Klein and Svetla Nikova and Bart Preneel and Jeroen Schillewaert and Leo Storme}, title = {Galois geometries and applications}, journal = {Des. Codes Cryptogr.}, volume = {56}, number = {2-3}, pages = {85--86}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9410-z}, doi = {10.1007/S10623-010-9410-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleEKKNPSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarretoNNRT10, author = {Paulo S. L. M. Barreto and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen and Elmar Tischhauser}, title = {Whirlwind: a new cryptographic hash function}, journal = {Des. Codes Cryptogr.}, volume = {56}, number = {2-3}, pages = {141--162}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9391-y}, doi = {10.1007/S10623-010-9391-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarretoNNRT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/SedghiLNHJ10, author = {Saeed Sedghi and Peter van Liesdonk and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Searching Keywords with Wildcards on Encrypted Data}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {138--153}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_10}, doi = {10.1007/978-3-642-15317-4\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/SedghiLNHJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GongHNZ09, author = {Zheng Gong and Pieter H. Hartel and Svetla Nikova and Bo Zhu}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Towards Secure and Practical MACs for Body Sensor Networks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {182--198}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_13}, doi = {10.1007/978-3-642-10628-6\_13}, timestamp = {Mon, 15 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GongHNZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IbraimiPNHJ09, author = {Luan Ibraimi and Milan Petkovic and Svetla Nikova and Pieter H. Hartel and Willem Jonker}, editor = {Heung Youl Youm and Moti Yung}, title = {Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {309--323}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_23}, doi = {10.1007/978-3-642-10838-9\_23}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IbraimiPNHJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/natosec/NikovaN09, author = {Svetla Nikova and Ventzislav Nikov}, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {Secret Sharing and Error Correcting}, booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, pages = {28--38}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-60750-002-5-28}, doi = {10.3233/978-1-60750-002-5-28}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/NikovaN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/natosec/23, editor = {Bart Preneel and Stefan M. Dodunekov and Vincent Rijmen and Svetla Nikova}, title = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes}, series = {{NATO} Science for Peace and Security Series - {D:} Information and Communication Security}, volume = {23}, publisher = {{IOS} Press}, year = {2009}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=12139}, isbn = {978-1-60750-002-5}, timestamp = {Wed, 11 May 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/natosec/23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/IndesteegeACDKN09, author = {Sebastiaan Indesteege and Elena Andreeva and Christophe De Canni{\`{e}}re and Orr Dunkelman and Emilia K{\"{a}}sper and Svetla Nikova and Bart Preneel and Elmar Tischhauser}, editor = {Helena Handschuh and Stefan Lucks and Bart Preneel and Phillip Rogaway}, title = {The Lane hash function}, booktitle = {Symmetric Cryptography, 11.01. - 16.01.2009}, series = {Dagstuhl Seminar Proceedings}, volume = {09031}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik, Germany}, year = {2009}, url = {http://drops.dagstuhl.de/opus/volltexte/2009/1952/}, timestamp = {Thu, 10 Jun 2021 13:02:06 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/IndesteegeACDKN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NikovaRS08, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {218--234}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_14}, doi = {10.1007/978-3-642-00730-9\_14}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NikovaRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NikovaRS08, author = {Svetla Nikova and Vincent Rijmen and Martin Schl{\"{a}}ffer}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Using Normal Bases for Compact Hardware Implementations of the {AES} S-Box}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {236--245}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_16}, doi = {10.1007/978-3-540-85855-3\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/NikovaRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KasperNN07, author = {Emilia K{\"{a}}sper and Ventzislav Nikov and Svetla Nikova}, editor = {Yvo Desmedt}, title = {Strongly Multiplicative Hierarchical Threshold Secret Sharing}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {148--168}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_13}, doi = {10.1007/978-3-642-10230-1\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/KasperNN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/NikovN07, author = {Ventzislav Nikov and Svetla Nikova}, title = {A Modification of Jarecki and Saxena Proactive {RSA} Signature Scheme}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2007, Nice, France, June 24-29, 2007}, pages = {1026--1029}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISIT.2007.4557117}, doi = {10.1109/ISIT.2007.4557117}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/NikovN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorissovLN07, author = {Yuri L. Borissov and Moon Ho Lee and Svetla Nikova}, title = {On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {301}, year = {2007}, url = {http://eprint.iacr.org/2007/301}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorissovLN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BraekenBNP06, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of cubic (n-4)-resilient Boolean functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {4}, pages = {1670--1676}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.871063}, doi = {10.1109/TIT.2006.871063}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BraekenBNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NikovNP06, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Xuejia Lai and Kefei Chen}, title = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {348--363}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_23}, doi = {10.1007/11935230\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NikovNP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NikovaRR06, author = {Svetla Nikova and Christian Rechberger and Vincent Rijmen}, editor = {Peng Ning and Sihan Qing and Ninghui Li}, title = {Threshold Implementations Against Side-Channel Attacks and Glitches}, booktitle = {Information and Communications Security, 8th International Conference, {ICICS} 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4307}, pages = {529--545}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935308\_38}, doi = {10.1007/11935308\_38}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/NikovaRR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenNN06, author = {An Braeken and Ventzislav Nikov and Svetla Nikova}, title = {On Zigzag Functions and Related Objects in New Metric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {437}, year = {2006}, url = {http://eprint.iacr.org/2006/437}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenNN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YuBorissovBNP05, author = {Yuri L. Borissov and An Braeken and Svetla Nikova and Bart Preneel}, title = {On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {3}, pages = {1182--1189}, year = {2005}, url = {https://doi.org/10.1109/TIT.2004.842779}, doi = {10.1109/TIT.2004.842779}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/YuBorissovBNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/BraekenNN05, author = {An Braeken and Ventzislav Nikov and Svetla Nikova}, editor = {Lusheng Wang}, title = {Error-Set Codes and Related Objects}, booktitle = {Computing and Combinatorics, 11th Annual International Conference, {COCOON} 2005, Kunming, China, August 16-29, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3595}, pages = {577--585}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11533719\_59}, doi = {10.1007/11533719\_59}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/BraekenNN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BraekenBNP05, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, editor = {Lu{\'{\i}}s Caires and Giuseppe F. Italiano and Lu{\'{\i}}s Monteiro and Catuscia Palamidessi and Moti Yung}, title = {Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties}, booktitle = {Automata, Languages and Programming, 32nd International Colloquium, {ICALP} 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3580}, pages = {324--334}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11523468\_27}, doi = {10.1007/11523468\_27}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BraekenBNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcc/NikovN05, author = {Ventzislav Nikov and Svetla Nikova}, editor = {{\O}yvind Ytrehus}, title = {On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes}, booktitle = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3969}, pages = {275--290}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11779360\_22}, doi = {10.1007/11779360\_22}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wcc/NikovN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenBNP05, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of Cubic (n-4)-resilient Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2005}, url = {http://eprint.iacr.org/2005/332}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenBNP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/NikovNP04, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Robust Metering Schemes for General Access Structures}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {53--65}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_5}, doi = {10.1007/978-3-540-30191-2\_5}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/icics/NikovNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BraekenNNP04, author = {An Braeken and Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {On Boolean Functions with Generalized Cryptographic Properties}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {120--135}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_11}, doi = {10.1007/978-3-540-30556-9\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BraekenNNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/NikovN04, author = {Ventzislav Nikov and Svetla Nikova}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {On Proactive Secret Sharing Schemes}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {308--325}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_22}, doi = {10.1007/978-3-540-30564-4\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/NikovN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NikovNP04, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Carlo Blundo and Stelvio Cimato}, title = {On the Size of Monotone Span Programs}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {249--262}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_18}, doi = {10.1007/978-3-540-30598-9\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/NikovNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenNN04, author = {An Braeken and Svetla Nikova and Ventzislav Nikov}, title = {On Cheating Immune Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {200}, year = {2004}, url = {http://eprint.iacr.org/2004/200}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenNN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BorissovBN04, author = {Yuri L. Borissov and An Braeken and Svetla Nikova}, title = {Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2004}, url = {http://eprint.iacr.org/2004/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BorissovBN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenBNP04, author = {An Braeken and Yuri L. Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2004}, url = {http://eprint.iacr.org/2004/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenBNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BraekenNNP04, author = {An Braeken and Ventzislav Nikov and Svetla Nikova and Bart Preneel}, title = {On Boolean Functions with Generalized Cryptographic Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {259}, year = {2004}, url = {http://eprint.iacr.org/2004/259}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BraekenNNP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovN04, author = {Ventzislav Nikov and Svetla Nikova}, title = {New Monotone Span Programs from Old}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2004}, url = {http://eprint.iacr.org/2004/282}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/BorissovMN03, author = {Yuri L. Borissov and Nikolai L. Manev and Svetla Nikova}, title = {On the Non-minimal Codewords in Binary Reed-Muller Codes}, journal = {Discret. Appl. Math.}, volume = {128}, number = {1}, pages = {65--74}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00436-5}, doi = {10.1016/S0166-218X(02)00436-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/BorissovMN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NikovaN03, author = {Svetla Nikova and Ventzislav Nikov}, title = {Improvement of the Delsarte Bound for t-Designs When It Is Not the Best Bound Possible}, journal = {Des. Codes Cryptogr.}, volume = {28}, number = {2}, pages = {201--222}, year = {2003}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NikovaN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NikovNP03, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Jianying Zhou and Moti Yung and Yongfei Han}, title = {Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case}, booktitle = {Applied Cryptography and Network Security, First International Conference, {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2846}, pages = {1--15}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45203-4\_1}, doi = {10.1007/978-3-540-45203-4\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/NikovNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BorissovBNP03, author = {Yuri L. Borissov and An Braeken and Svetla Nikova and Bart Preneel}, editor = {Kenneth G. Paterson}, title = {On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {82--92}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_8}, doi = {10.1007/978-3-540-40974-8\_8}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/BorissovBNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NikovNP03, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {On Multiplicative Linear Secret Sharing Schemes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {135--147}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_10}, doi = {10.1007/978-3-540-24582-7\_10}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NikovNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNP03, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, title = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2003}, url = {http://eprint.iacr.org/2003/006}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovN03, author = {Ventzislav Nikov and Svetla Nikova}, title = {On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2003}, url = {http://eprint.iacr.org/2003/210}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NikovNPV02, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, editor = {Alfred Menezes and Palash Sarkar}, title = {On Unconditionally Secure Distributed Oblivious Transfer}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {395--408}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_31}, doi = {10.1007/3-540-36231-2\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NikovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NikovNPV02a, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, editor = {Alfred Menezes and Palash Sarkar}, title = {On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {422--436}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_33}, doi = {10.1007/3-540-36231-2\_33}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NikovNPV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BorissovNPV02, author = {Yuri L. Borissov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {On a Resynchronization Weakness in a Class of Combiners with Memory}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {164--173}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_12}, doi = {10.1007/3-540-36413-7\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/BorissovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNPV02, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Metering Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {102}, year = {2002}, url = {http://eprint.iacr.org/2002/102}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNPV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NikovNPV02a, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Proactive Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {141}, year = {2002}, url = {http://eprint.iacr.org/2002/141}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NikovNPV02a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/BorissovMN01, author = {Yuri L. Borissov and Nikolai L. Manev and Svetla Nikova}, title = {On the Non-Minimal codewords of weight 2d\({}_{\mbox{min}}\) in the binary Reed-Muller Code}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {548--555}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00207-0}, doi = {10.1016/S1571-0653(04)00207-0}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/BorissovMN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/NikovaN01, author = {Svetla Nikova and Ventzislav Nikov}, editor = {Bahram Honary}, title = {Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces}, booktitle = {Cryptography and Coding, 8th {IMA} International Conference, Cirencester, UK, December 17-19, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2260}, pages = {191--204}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45325-3\_18}, doi = {10.1007/3-540-45325-3\_18}, timestamp = {Wed, 18 Mar 2020 16:01:01 +0100}, biburl = {https://dblp.org/rec/conf/ima/NikovaN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcg/BoyvalenkovDN99, author = {Peter G. Boyvalenkov and Danyo Danev and Svetla Nikova}, title = {Nonexistence of Certain Spherical Designs of Odd Strengths and Cardinalities}, journal = {Discret. Comput. Geom.}, volume = {21}, number = {1}, pages = {143--156}, year = {1999}, url = {https://doi.org/10.1007/PL00009406}, doi = {10.1007/PL00009406}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcg/BoyvalenkovDN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/NikovaN99, author = {Svetla Nikova and Ventzislav Nikov}, editor = {Michael Walker}, title = {Some Applications of Bounds for Designs to the Cryptography}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {25--34}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_2}, doi = {10.1007/3-540-46665-7\_2}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/NikovaN99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiwac/BoyvalenkovN93, author = {Peter G. Boyvalenkov and Svetla Nikova}, editor = {G{\'{e}}rard D. Cohen and Simon Litsyn and Antoine Lobstein and Gilles Z{\'{e}}mor}, title = {New lower bounds for some spherical designs}, booktitle = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July 19-21, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {781}, pages = {207--216}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57843-9\_21}, doi = {10.1007/3-540-57843-9\_21}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fiwac/BoyvalenkovN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.