Svetla Nikova

Orcid: 0000-0003-3133-9261

Affiliations:
  • KU Leuven, ESAT-COSIC and imec, Belgium


According to our database1, Svetla Nikova authored at least 108 papers between 1993 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Mining Power Destruction Attacks in the Presence of Petty-Compliant Mining Pools.
CoRR, February, 2025

Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure?
IEEE Trans. Inf. Forensics Secur., 2025

Combined Stability: Protecting against Combined Attacks.
IACR Cryptol. ePrint Arch., 2025

Picking up the Fallen Mask: Breaking and Fixing the RS-Mask Countermeasure.
IACR Cryptol. ePrint Arch., 2025

Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Time-Averaged Analysis of Selfish Mining in Bitcoin.
IACR Cryptol. ePrint Arch., 2024

Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.
Proceedings of the Financial Cryptography and Data Security, 2024

SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

CAPABARA: A Combined Attack on CAPA.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024

Glitch-Stopping Circuits: Hardware Secure Masking without Registers.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M.
IACR Cryptol. ePrint Arch., 2023

Who Watches the Watchers: Attacking Glitch Detection Circuits.
IACR Cryptol. ePrint Arch., 2023

On Decompositions of Permutations in Quadratic Functions.
IACR Cryptol. ePrint Arch., 2023

The Random Fault Model.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

2022
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes.
IACR Cryptol. ePrint Arch., 2022

A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party Computation.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022

Guarding the First Order: The Rise of AES Maskings.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
LLTI: Low-Latency Threshold Implementations.
IEEE Trans. Inf. Forensics Secur., 2021

First-Order Hardware Sharings of the AES.
IACR Cryptol. ePrint Arch., 2021

Resilient Uniformity: Applying Resiliency in Masking.
IACR Cryptol. ePrint Arch., 2021

Exploring the storj network: a security analysis.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
On the Sixth International Olympiad in Cryptography NSUCRYPTO.
CoRR, 2020

Authenticated and auditable data sharing via smart contract.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

Cryptographic Fault Diagnosis using VerFI.
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020

My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
Proceedings of the Smart Card Research and Advanced Applications, 2020

2019
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019

Threshold Implementations in the Robust Probing Model.
Proceedings of ACM Workshop on Theory of Implementation Security, 2019

TIS'19: Theory of Implementation Security Workshop 2019.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Constructions of S-boxes with uniform sharing.
IACR Cryptol. ePrint Arch., 2018

Decomposition of Permutations in a Finite Field.
IACR Cryptol. ePrint Arch., 2018

M&M: Masks and Macs against Physical Attacks.
IACR Cryptol. ePrint Arch., 2018

Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018

VerMI: Verification Tool for Masked Implementations.
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018

Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition.
Proceedings of the Financial Cryptography and Data Security, 2018

Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018

CAPA: The Spirit of Beaver Against Physical Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks.
IEEE Trans. Very Large Scale Integr. Syst., 2017

Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Cryptol. ePrint Arch., 2017

Does Coupling Affect the Security of Masked Implementations?
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
More Efficient Private Circuits II through Threshold Implementations.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Masking AES With d+1 Shares in Hardware.
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016

Theory of Implementation Security Workshop (TIs 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Problems, solutions and experience of the first international student's Olympiad in cryptography.
IACR Cryptol. ePrint Arch., 2015

Threshold implementations of small S-boxes.
Cryptogr. Commun., 2015

Consolidating Masking Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Compact Implementations of Multi-Sbox Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.
J. Comput. Sci. Technol., 2014

Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

Higher-Order Threshold Implementations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

A More Efficient AES Threshold Implementation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Preface.
Comput. Math. Appl., 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Threshold Implementations of all 3x3 and 4x4 S-boxes.
IACR Cryptol. ePrint Arch., 2012

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches.
J. Cryptol., 2011

KLEIN: A New Family of Lightweight Block Ciphers.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Privacy Enhanced Access Control by Means of Policy Blinding.
Proceedings of the Information Security Practice and Experience, 2011

Public-Key Encryption with Delegated Search.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Galois geometries and applications.
Des. Codes Cryptogr., 2010

Whirlwind: a new cryptographic hash function.
Des. Codes Cryptogr., 2010

Searching Keywords with Wildcards on Encrypted Data.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Secret Sharing and Error Correcting.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Towards Secure and Practical MACs for Body Sensor Networks.
Proceedings of the Progress in Cryptology, 2009

The Lane hash function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Using Normal Bases for Compact Hardware Implementations of the AES S-Box.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.
Proceedings of the Information Security and Cryptology, 2008

2007
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials.
IACR Cryptol. ePrint Arch., 2007

A Modification of Jarecki and Saxena Proactive RSA Signature Scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Strongly Multiplicative Hierarchical Threshold Secret Sharing.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
On Zigzag Functions and Related Objects in New Metric.
IACR Cryptol. ePrint Arch., 2006

Threshold Implementations Against Side-Channel Attacks and Glitches.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.
Proceedings of the Advances in Cryptology, 2006

2005
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.
IEEE Trans. Inf. Theory, 2005

Classification of Cubic (n-4)-resilient Boolean Functions.
IACR Cryptol. ePrint Arch., 2005

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.
Proceedings of the Coding and Cryptography, International Workshop, 2005

Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Error-Set Codes and Related Objects.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
New Monotone Span Programs from Old.
IACR Cryptol. ePrint Arch., 2004

On Cheating Immune Secret Sharing.
IACR Cryptol. ePrint Arch., 2004

Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004

Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions.
IACR Cryptol. ePrint Arch., 2004

On the Size of Monotone Span Programs.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

On Proactive Secret Sharing Schemes.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

On Boolean Functions with Generalized Cryptographic Properties.
Proceedings of the Progress in Cryptology, 2004

Robust Metering Schemes for General Access Structures.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case.
IACR Cryptol. ePrint Arch., 2003

Improvement of the Delsarte Bound for t-Designs When It Is Not the Best Bound Possible.
Des. Codes Cryptogr., 2003

On the Non-minimal Codewords in Binary Reed-Muller Codes.
Discret. Appl. Math., 2003

On Multiplicative Linear Secret Sharing Schemes.
Proceedings of the Progress in Cryptology, 2003

On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
Proceedings of the Cryptography and Coding, 2003

Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Applying General Access Structure to Proactive Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2002

Applying General Access Structure to Metering Schemes.
IACR Cryptol. ePrint Arch., 2002

On a Resynchronization Weakness in a Class of Combiners with Memory.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Proceedings of the Progress in Cryptology, 2002

On Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Progress in Cryptology, 2002

2001
On the Non-Minimal codewords of weight 2d<sub>min</sub> in the binary Reed-Muller Code.
Electron. Notes Discret. Math., 2001

Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces.
Proceedings of the Cryptography and Coding, 2001

1999
Nonexistence of Certain Spherical Designs of Odd Strengths and Cardinalities.
Discret. Comput. Geom., 1999

Some Applications of Bounds for Designs to the Cryptography.
Proceedings of the Cryptography and Coding, 1999

1993
New lower bounds for some spherical designs.
Proceedings of the Algebraic Coding, 1993


  Loading...