Svetla Nikova
Orcid: 0000-0003-3133-9261Affiliations:
- KU Leuven, ESAT-COSIC and imec, Belgium
According to our database1,
Svetla Nikova
authored at least 108 papers
between 1993 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2025
CoRR, February, 2025
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure?
IEEE Trans. Inf. Forensics Secur., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Bitcoin Under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Financial Cryptography and Data Security, 2024
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
2022
An Optimal Universal Construction for the Threshold Implementation of Bijective S-boxes.
IACR Cryptol. ePrint Arch., 2022
A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party Computation.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022
Proceedings of the Smart Card Research and Advanced Applications, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
2020
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the 2020 IEEE International Symposium on Hardware Oriented Security and Trust, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the Smart Card Research and Advanced Applications, 2020
2019
Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019
Proceedings of ACM Workshop on Theory of Implementation Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018
Proceedings of the 25th IEEE International Conference on Electronics, Circuits and Systems, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Guards in Action: First-Order SCA Secure Implementations of Ketje Without Additional Randomness.
Proceedings of the 21st Euromicro Conference on Digital System Design, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks.
IEEE Trans. Very Large Scale Integr. Syst., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2017
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017
2016
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016
Proceedings of the ACM Workshop on Theory of Implementation Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015
Problems, solutions and experience of the first international student's Olympiad in cryptography.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
Proceedings of the Smart Card Research and Advanced Applications, 2015
Proceedings of the Cryptography and Information Security in the Balkans, 2015
2014
J. Comput. Sci. Technol., 2014
Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Proceedings of the Smart Card Research and Advanced Applications, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
J. Cryptol., 2011
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
2009
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009
2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Information Security and Cryptology, 2008
2007
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information and Communications Security, 8th International Conference, 2006
Proceedings of the Advances in Cryptology, 2006
2005
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.
IEEE Trans. Inf. Theory, 2005
IACR Cryptol. ePrint Arch., 2005
On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.
Proceedings of the Coding and Cryptography, International Workshop, 2005
Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005
2004
Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004
Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
2003
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case.
IACR Cryptol. ePrint Arch., 2003
Improvement of the Delsarte Bound for t-Designs When It Is Not the Best Bound Possible.
Des. Codes Cryptogr., 2003
Proceedings of the Progress in Cryptology, 2003
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
Proceedings of the Cryptography and Coding, 2003
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Proceedings of the Applied Cryptography and Network Security, 2003
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Progress in Cryptology, 2002
2001
On the Non-Minimal codewords of weight 2d<sub>min</sub> in the binary Reed-Muller Code.
Electron. Notes Discret. Math., 2001
Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces.
Proceedings of the Cryptography and Coding, 2001
1999
Discret. Comput. Geom., 1999
Proceedings of the Cryptography and Coding, 1999
1993
Proceedings of the Algebraic Coding, 1993