Svetla Nikova

Orcid: 0000-0003-3133-9261

Affiliations:
  • KU Leuven, ESAT-COSIC and imec, Belgium


According to our database1, Svetla Nikova authored at least 102 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Who Watches the Watchers: Attacking Glitch Detection Circuits.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice.
IACR Cryptol. ePrint Arch., 2024

CAPABARA: A Combined Attack on CAPA.
IACR Cryptol. ePrint Arch., 2024

Time-Averaged Analysis of Selfish Mining in Bitcoin.
IACR Cryptol. ePrint Arch., 2024

2023
An Optimal Universal Construction for the Threshold Implementation of Bijective S-Boxes.
IEEE Trans. Inf. Theory, October, 2023

All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M.
IACR Cryptol. ePrint Arch., 2023

On Decompositions of Permutations in Quadratic Functions.
IACR Cryptol. ePrint Arch., 2023

The Random Fault Model.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

2022
Resilient uniformity: applying resiliency in masking.
Cryptogr. Commun., 2022

A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party Computation.
Proceedings of the 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2022

Guarding the First Order: The Rise of AES Maskings.
Proceedings of the Smart Card Research and Advanced Applications, 2022

2021
LLTI: Low-Latency Threshold Implementations.
IEEE Trans. Inf. Forensics Secur., 2021

First-Order Hardware Sharings of the AES.
IACR Cryptol. ePrint Arch., 2021

Exploring the storj network: a security analysis.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

2020
Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries.
IACR Cryptol. ePrint Arch., 2020

On the Sixth International Olympiad in Cryptography NSUCRYPTO.
CoRR, 2020

Authenticated and auditable data sharing via smart contract.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
M&M: Masks and Macs against Physical Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Guards in action: First-order SCA secure implementations of KETJE without additional randomness.
Microprocess. Microsystems, 2019

Threshold Implementations in the Robust Probing Model.
IACR Cryptol. ePrint Arch., 2019

My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks.
IACR Cryptol. ePrint Arch., 2019

Cryptographic Fault Diagnosis using VerFI.
IACR Cryptol. ePrint Arch., 2019

Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition.
IACR Cryptol. ePrint Arch., 2019

Problems and solutions from the fourth International Students' Olympiad in Cryptography (NSUCRYPTO).
Cryptologia, 2019

Constructions of S-boxes with uniform sharing.
Cryptogr. Commun., 2019

Decomposition of permutations in a finite field.
Cryptogr. Commun., 2019

TIS'19: Theory of Implementation Security Workshop 2019.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Rhythmic Keccak: SCA Security and Low Latency in HW.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Problems and solutions of the Fourth International Students' Olympiad in Cryptography NSUCRYPTO.
CoRR, 2018

2017
Securing the PRESENT Block Cipher Against Combined Side-Channel Analysis and Fault Attacks.
IEEE Trans. Very Large Scale Integr. Syst., 2017

CAPA: The Spirit of Beaver against Physical Attacks.
IACR Cryptol. ePrint Arch., 2017

VerMI: Verification Tool for Masked Implementations.
IACR Cryptol. ePrint Arch., 2017

A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Masking AES with d+1 Shares in Hardware.
IACR Cryptol. ePrint Arch., 2016

Does Coupling Affect the Security of Masked Implementations?
IACR Cryptol. ePrint Arch., 2016

Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties.
Cryptogr. Commun., 2016

More Efficient Private Circuits II through Threshold Implementations.
Proceedings of the 2016 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2016

Theory of Implementation Security Workshop (TIs 2016).
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Consolidating masking schemes.
IACR Cryptol. ePrint Arch., 2015

Problems, solutions and experience of the first international student's Olympiad in cryptography.
IACR Cryptol. ePrint Arch., 2015

Threshold implementations of small S-boxes.
Cryptogr. Commun., 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Compact Implementations of Multi-Sbox Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks.
J. Comput. Sci. Technol., 2014

Higher-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2014

Higher-Order Glitch Resistant Implementation of the PRESENT S-Box.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
A More Efficient AES Threshold Implementation.
IACR Cryptol. ePrint Arch., 2013

Preface.
Comput. Math. Appl., 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
Threshold Implementations of all 3x3 and 4x4 S-boxes.
IACR Cryptol. ePrint Arch., 2012

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches.
J. Cryptol., 2011

KLEIN: A New Family of Lightweight Block Ciphers.
Proceedings of the RFID. Security and Privacy - 7th International Workshop, 2011

Privacy Enhanced Access Control by Means of Policy Blinding.
Proceedings of the Information Security Practice and Experience, 2011

Public-Key Encryption with Delegated Search.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Galois geometries and applications.
Des. Codes Cryptogr., 2010

Whirlwind: a new cryptographic hash function.
Des. Codes Cryptogr., 2010

Searching Keywords with Wildcards on Encrypted Data.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Secret Sharing and Error Correcting.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Towards Secure and Practical MACs for Body Sensor Networks.
Proceedings of the Progress in Cryptology, 2009

The Lane hash function.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
Using Normal Bases for Compact Hardware Implementations of the AES S-Box.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008

Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.
Proceedings of the Information Security and Cryptology, 2008

2007
On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials.
IACR Cryptol. ePrint Arch., 2007

A Modification of Jarecki and Saxena Proactive RSA Signature Scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Strongly Multiplicative Hierarchical Threshold Secret Sharing.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Classification of cubic (n-4)-resilient Boolean functions.
IEEE Trans. Inf. Theory, 2006

On Zigzag Functions and Related Objects in New Metric.
IACR Cryptol. ePrint Arch., 2006

Threshold Implementations Against Side-Channel Attacks and Glitches.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.
Proceedings of the Advances in Cryptology, 2006

2005
On the covering radii of binary Reed-Muller codes in the set of resilient Boolean functions.
IEEE Trans. Inf. Theory, 2005

Classification of Boolean Functions of 6 Variables or Less with Respect to Some Cryptographic Properties.
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005

Error-Set Codes and Related Objects.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
New Monotone Span Programs from Old.
IACR Cryptol. ePrint Arch., 2004

On Boolean Functions with Generalized Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004

On Cheating Immune Secret Sharing.
IACR Cryptol. ePrint Arch., 2004

Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004

Covering Radius of the (n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions.
IACR Cryptol. ePrint Arch., 2004

On the Size of Monotone Span Programs.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

On Proactive Secret Sharing Schemes.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Robust Metering Schemes for General Access Structures.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case.
IACR Cryptol. ePrint Arch., 2003

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.
IACR Cryptol. ePrint Arch., 2003

Improvement of the Delsarte Bound for t-Designs When It Is Not the Best Bound Possible.
Des. Codes Cryptogr., 2003

On the Non-minimal Codewords in Binary Reed-Muller Codes.
Discret. Appl. Math., 2003

On Multiplicative Linear Secret Sharing Schemes.
Proceedings of the Progress in Cryptology, 2003

On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions.
Proceedings of the Cryptography and Coding, 2003

Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Applying General Access Structure to Proactive Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2002

Applying General Access Structure to Metering Schemes.
IACR Cryptol. ePrint Arch., 2002

On a Resynchronization Weakness in a Class of Combiners with Memory.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Proceedings of the Progress in Cryptology, 2002

On Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Progress in Cryptology, 2002

2001
On the Non-Minimal codewords of weight 2d<sub>min</sub> in the binary Reed-Muller Code.
Electron. Notes Discret. Math., 2001

Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces.
Proceedings of the Cryptography and Coding, 2001

1999
Nonexistence of Certain Spherical Designs of Odd Strengths and Cardinalities.
Discret. Comput. Geom., 1999

Some Applications of Bounds for Designs to the Cryptography.
Proceedings of the Cryptography and Coding, 1999

1993
New lower bounds for some spherical designs.
Proceedings of the Algebraic Coding, 1993


  Loading...