Ventzislav Nikov

According to our database1, Ventzislav Nikov authored at least 57 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications.
IEEE Trans. Emerg. Top. Comput., 2024

Who Watches the Watchers: Attacking Glitch Detection Circuits.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Glitch-Stopping Circuits: Hardware Secure Masking without Registers.
IACR Cryptol. ePrint Arch., 2024

SoK: Parameterization of Fault Adversary Models - Connecting Theory and Practice.
IACR Cryptol. ePrint Arch., 2024

CAPABARA: A Combined Attack on CAPA.
IACR Cryptol. ePrint Arch., 2024

2022
Optimized threshold implementations: securing cryptographic accelerators for low-energy and low-latency applications.
J. Cryptogr. Eng., 2022

2021
Cyber Resilience for Self-Monitoring IoT Devices.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2021

2020
PRINCEv2 - More Security for (Almost) No Overhead.
IACR Cryptol. ePrint Arch., 2020

2019
M&M: Masks and Macs against Physical Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Constructions of S-boxes with uniform sharing.
Cryptogr. Commun., 2019

Decomposition of permutations in a finite field.
Cryptogr. Commun., 2019

Design Trade-offs in Threshold Implementations.
Proceedings of the 26th IEEE International Conference on Electronics, Circuits and Systems, 2019

Optimized Threshold Implementations: Minimizing the Latency of Secure Cryptographic Accelerators.
Proceedings of the Smart Card Research and Advanced Applications, 2019

2017
CAPA: The Spirit of Beaver against Physical Attacks.
IACR Cryptol. ePrint Arch., 2017

2016
Low-Latency ECDSA Signature Verification - A Road Toward Safer Traffic.
IEEE Trans. Very Large Scale Integr. Syst., 2016

Masking AES with d+1 Shares in Hardware.
IACR Cryptol. ePrint Arch., 2016

Does Coupling Affect the Security of Masked Implementations?
IACR Cryptol. ePrint Arch., 2016

Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Trade-Offs for Threshold Implementations Illustrated on AES.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Threshold implementations of small S-boxes.
Cryptogr. Commun., 2015

Higher-Order Threshold Implementation of the AES S-Box.
Proceedings of the Smart Card Research and Advanced Applications, 2015

Compact Implementations of Multi-Sbox Designs.
Proceedings of the Smart Card Research and Advanced Applications, 2015

2014
Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -.
IACR Cryptol. ePrint Arch., 2014

Higher-Order Threshold Implementations.
IACR Cryptol. ePrint Arch., 2014

2013
A More Efficient AES Threshold Implementation.
IACR Cryptol. ePrint Arch., 2013

Efficient and First-Order DPA Resistant Implementations of Keccak.
Proceedings of the Smart Card Research and Advanced Applications, 2013

2012
PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version).
IACR Cryptol. ePrint Arch., 2012

Threshold Implementations of all 3x3 and 4x4 S-boxes.
IACR Cryptol. ePrint Arch., 2012

Low-Latency Encryption - Is "Lightweight = Light + Wait"?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2010
Whirlwind: a new cryptographic hash function.
Des. Codes Cryptogr., 2010

2009
Secret Sharing and Error Correcting.
Proceedings of the Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, 2009

2008
Yet Another Secure Distance-Bounding Protocol.
IACR Cryptol. ePrint Arch., 2008

2007
A Modification of Jarecki and Saxena Proactive RSA Signature Scheme.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Strongly Multiplicative Hierarchical Threshold Secret Sharing.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
A DoS Attack Against the Integrity-Less ESP (IPSec).
IACR Cryptol. ePrint Arch., 2006

On Zigzag Functions and Related Objects in New Metric.
IACR Cryptol. ePrint Arch., 2006

A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.
Proceedings of the Advances in Cryptology, 2006

2005
Error-Set Codes and Related Objects.
Proceedings of the Computing and Combinatorics, 11th Annual International Conference, 2005

2004
New Monotone Span Programs from Old.
IACR Cryptol. ePrint Arch., 2004

On Boolean Functions with Generalized Cryptographic Properties.
IACR Cryptol. ePrint Arch., 2004

On Cheating Immune Secret Sharing.
IACR Cryptol. ePrint Arch., 2004

On the Size of Monotone Span Programs.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

On Proactive Secret Sharing Schemes.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

Robust Metering Schemes for General Access Structures.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case.
IACR Cryptol. ePrint Arch., 2003

On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes.
IACR Cryptol. ePrint Arch., 2003

Improvement of the Delsarte Bound for t-Designs When It Is Not the Best Bound Possible.
Des. Codes Cryptogr., 2003

On Multiplicative Linear Secret Sharing Schemes.
Proceedings of the Progress in Cryptology, 2003

Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Applying General Access Structure to Proactive Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2002

Applying General Access Structure to Metering Schemes.
IACR Cryptol. ePrint Arch., 2002

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Proceedings of the Progress in Cryptology, 2002

On Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Progress in Cryptology, 2002

2001
Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces.
Proceedings of the Cryptography and Coding, 2001

1999
Some Applications of Bounds for Designs to the Cryptography.
Proceedings of the Cryptography and Coding, 1999


  Loading...