What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Svetla Nikova
Google Scholar
ORCID:
0000-0003-3133-9261
34
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure?
Roozbeh Sarenche
Ren Zhang
Svetla Nikova
Bart Preneel
2025
journals/joc
On Decompositions of Permutations in Quadratic Functions.
Samuele Andreoli
Enrico Piccione
Lilya Budaghyan
Pantelimon Stanica
Svetla Nikova
2024
journals/tches
Who Watches the Watchers: Attacking Glitch Detection Circuits.
Amund Askeland
Svetla Nikova
Ventzislav Nikov
2024
journals/tches
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M.
Haruka Hirata
Daiki Miyahara
Victor Arribas
Yang Li
Noriyuki Miura
Svetla Nikova
Kazuo Sakiyama
2024
conf/fc
Deep Selfish Proposing in Longest-Chain Proof-of-Stake Protocols.
Roozbeh Sarenche
Svetla Nikova
Bart Preneel
2024
conf/ctrsa
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice.
Dilara Toprakhisar
Svetla Nikova
Ventzislav Nikov
2023
conf/sacrypt
The Random Fault Model.
Siemen Dhooghe
Svetla Nikova
2021
journals/tifs
LLTI: Low-Latency Threshold Implementations.
Victor Arribas
Zhenda Zhang
Svetla Nikova
2020
conf/host
Cryptographic Fault Diagnosis using VerFI.
Victor Arribas
Felix Wegener
Amir Moradi
Svetla Nikova
2020
conf/ctrsa
My Gadget Just Cares for Me - How NINA Can Prove Security Against Combined Attacks.
Siemen Dhooghe
Svetla Nikova
2019
journals/tches
M&M: Masks and Macs against Physical Attacks.
Lauren De Meyer
Victor Arribas
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2019
conf/ccs
TIS'19: Theory of Implementation Security Workshop 2019.
Begül Bilgin
Svetla Nikova
Vincent Rijmen
2019
conf/ccs
Threshold Implementations in the Robust Probing Model.
Siemen Dhooghe
Svetla Nikova
Vincent Rijmen
2018
journals/tches
Rhythmic Keccak: SCA Security and Low Latency in HW.
Victor Arribas
Begül Bilgin
George Petrides
Svetla Nikova
Vincent Rijmen
2018
conf/crypto
CAPA: The Spirit of Beaver Against Physical Attacks.
Oscar Reparaz
Lauren De Meyer
Begül Bilgin
Victor Arribas
Svetla Nikova
Ventzislav Nikov
Nigel P. Smart
2018
conf/fc
Practically Efficient Secure Distributed Exponentiation Without Bit-Decomposition.
Abdelrahaman Aly
Aysajan Abidin
Svetla Nikova
2017
conf/cans
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network.
Tomer Ashur
Jeroen Delvaux
Sanghan Lee
Pieter Maene
Eduard Marin
Svetla Nikova
Oscar Reparaz
Vladimir Rozic
Dave Singelée
Bohan Yang
Bart Preneel
2016
conf/ccs
Masking AES With d+1 Shares in Hardware.
Thomas De Cnudde
Oscar Reparaz
Begül Bilgin
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2016
conf/ccs
Theory of Implementation Security Workshop (TIs 2016).
Begül Bilgin
Svetla Nikova
Vincent Rijmen
2016
conf/ches
Masking AES with d+1 Shares in Hardware.
Thomas De Cnudde
Oscar Reparaz
Begül Bilgin
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2016
conf/fdtc
More Efficient Private Circuits II through Threshold Implementations.
Thomas De Cnudde
Svetla Nikova
2015
conf/crypto
Consolidating Masking Schemes.
Oscar Reparaz
Begül Bilgin
Svetla Nikova
Benedikt Gierlichs
Ingrid Verbauwhede
2014
conf/asiacrypt
Higher-Order Threshold Implementations.
Begül Bilgin
Benedikt Gierlichs
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2014
conf/africacrypt
A More Efficient AES Threshold Implementation.
Begül Bilgin
Benedikt Gierlichs
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2012
conf/ches
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Begül Bilgin
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
Georg Stütz
2011
journals/joc
Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches.
Svetla Nikova
Vincent Rijmen
Martin Schläffer
2011
conf/acns
Public-Key Encryption with Delegated Search.
Luan Ibraimi
Svetla Nikova
Pieter H. Hartel
Willem Jonker
2009
conf/wisa
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application.
Luan Ibraimi
Milan Petkovic
Svetla Nikova
Pieter H. Hartel
Willem Jonker
2008
conf/icisc
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.
Svetla Nikova
Vincent Rijmen
Martin Schläffer
2006
conf/icics
Threshold Implementations Against Side-Channel Attacks and Glitches.
Svetla Nikova
Christian Rechberger
Vincent Rijmen
2006
conf/asiacrypt
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.
Ventzislav Nikov
Svetla Nikova
Bart Preneel
2004
conf/icics
Robust Metering Schemes for General Access Structures.
Ventzislav Nikov
Svetla Nikova
Bart Preneel
2004
conf/sacrypt
On Proactive Secret Sharing Schemes.
Ventzislav Nikov
Svetla Nikova
2003
conf/acns
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Ventzislav Nikov
Svetla Nikova
Bart Preneel
Coauthors
Abdelrahaman Aly
(1)
Amir Moradi
(1)
Amund Askeland
(1)
Aysajan Abidin
(1)
Bart Preneel
(6)
Begül Bilgin
(10)
Benedikt Gierlichs
(3)
Bohan Yang
(1)
Christian Rechberger
(1)
Daiki Miyahara
(1)
Dave Singelée
(1)
Dilara Toprakhisar
(1)
Eduard Marin
(1)
Enrico Piccione
(1)
Felix Wegener
(1)
Georg Stütz
(1)
George Petrides
(1)
Haruka Hirata
(1)
Ingrid Verbauwhede
(1)
Jeroen Delvaux
(1)
Kazuo Sakiyama
(1)
Lauren De Meyer
(2)
Lilya Budaghyan
(1)
Luan Ibraimi
(2)
Martin Schläffer
(2)
Milan Petkovic
(1)
Nigel P. Smart
(1)
Noriyuki Miura
(1)
Oscar Reparaz
(5)
Pantelimon Stanica
(1)
Pieter H. Hartel
(2)
Pieter Maene
(1)
Ren Zhang
(1)
Roozbeh Sarenche
(2)
Samuele Andreoli
(1)
Sanghan Lee
(1)
Siemen Dhooghe
(3)
Svetla Nikova
(34)
Thomas De Cnudde
(3)
Tomer Ashur
(1)
Ventzislav Nikov
(13)
Victor Arribas
(6)
Vincent Rijmen
(13)
Vladimir Rozic
(1)
Willem Jonker
(2)
Yang Li
(1)
Zhenda Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to