What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ventzislav Nikov
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/tches
Who Watches the Watchers: Attacking Glitch Detection Circuits.
Amund Askeland
Svetla Nikova
Ventzislav Nikov
2024
conf/ccs
Glitch-Stopping Circuits: Hardware Secure Masking without Registers.
Zhenda Zhang
Svetla Petkova-Nikova
Ventzislav Nikov
2024
conf/ctrsa
SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice.
Dilara Toprakhisar
Svetla Nikova
Ventzislav Nikov
2021
conf/csr2
Cyber Resilience for Self-Monitoring IoT Devices.
Marcel Medwed
Ventzislav Nikov
Joost Renes
Tobias Schneider
Nikita Veshchikov
2020
conf/sacrypt
PRINCEv2 - More Security for (Almost) No Overhead.
Dusan Bozilov
Maria Eichlseder
Miroslav Knezevic
Baptiste Lambin
Gregor Leander
Thorben Moos
Ventzislav Nikov
Shahram Rasoolzadeh
Yosuke Todo
Friedrich Wiemer
2019
journals/tches
M&M: Masks and Macs against Physical Attacks.
Lauren De Meyer
Victor Arribas
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2018
conf/crypto
CAPA: The Spirit of Beaver Against Physical Attacks.
Oscar Reparaz
Lauren De Meyer
Begül Bilgin
Victor Arribas
Svetla Nikova
Ventzislav Nikov
Nigel P. Smart
2016
conf/ccs
Masking AES With d+1 Shares in Hardware.
Thomas De Cnudde
Oscar Reparaz
Begül Bilgin
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2016
conf/ches
Masking AES with d+1 Shares in Hardware.
Thomas De Cnudde
Oscar Reparaz
Begül Bilgin
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2016
conf/asiacrypt
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF.
Marcel Medwed
François-Xavier Standaert
Ventzislav Nikov
Martin Feldhofer
2014
conf/asiacrypt
Higher-Order Threshold Implementations.
Begül Bilgin
Benedikt Gierlichs
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2014
conf/africacrypt
A More Efficient AES Threshold Implementation.
Begül Bilgin
Benedikt Gierlichs
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
2012
conf/ches
Low-Latency Encryption - Is "Lightweight = Light + Wait"?
Miroslav Knezevic
Ventzislav Nikov
Peter Rombouts
2012
conf/ches
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes.
Begül Bilgin
Svetla Nikova
Ventzislav Nikov
Vincent Rijmen
Georg Stütz
2012
conf/asiacrypt
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract.
Julia Borghoff
Anne Canteaut
Tim Güneysu
Elif Bilge Kavun
Miroslav Knezevic
Lars R. Knudsen
Gregor Leander
Ventzislav Nikov
Christof Paar
Christian Rechberger
Peter Rombouts
Søren S. Thomsen
Tolga Yalçin
2006
conf/asiacrypt
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols.
Ventzislav Nikov
Svetla Nikova
Bart Preneel
2004
conf/icics
Robust Metering Schemes for General Access Structures.
Ventzislav Nikov
Svetla Nikova
Bart Preneel
2004
conf/sacrypt
On Proactive Secret Sharing Schemes.
Ventzislav Nikov
Svetla Nikova
2003
conf/acns
Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case.
Ventzislav Nikov
Svetla Nikova
Bart Preneel
Coauthors
Amund Askeland
(1)
Anne Canteaut
(1)
Baptiste Lambin
(1)
Bart Preneel
(3)
Begül Bilgin
(6)
Benedikt Gierlichs
(2)
Christian Rechberger
(1)
Christof Paar
(1)
Dilara Toprakhisar
(1)
Dusan Bozilov
(1)
Elif Bilge Kavun
(1)
François-Xavier Standaert
(1)
Friedrich Wiemer
(1)
Georg Stütz
(1)
Gregor Leander
(2)
Joost Renes
(1)
Julia Borghoff
(1)
Lars R. Knudsen
(1)
Lauren De Meyer
(2)
Marcel Medwed
(2)
Maria Eichlseder
(1)
Martin Feldhofer
(1)
Miroslav Knezevic
(3)
Nigel P. Smart
(1)
Nikita Veshchikov
(1)
Oscar Reparaz
(3)
Peter Rombouts
(2)
Shahram Rasoolzadeh
(1)
Svetla Nikova
(13)
Svetla Petkova-Nikova
(1)
Søren S. Thomsen
(1)
Thomas De Cnudde
(2)
Thorben Moos
(1)
Tim Güneysu
(1)
Tobias Schneider
(1)
Tolga Yalçin
(1)
Ventzislav Nikov
(19)
Victor Arribas
(2)
Vincent Rijmen
(6)
Yosuke Todo
(1)
Zhenda Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to