The following pages link to Svetla Nikova (Q269569):
Displayed 50 items.
- Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties (Q269570) (← links)
- Secure hardware implementation of nonlinear functions in the presence of glitches (Q656517) (← links)
- My gadget just cares for me -- how NINA can prove security against combined attacks (Q784996) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- Item:Q269569 (redirect page) (← links)
- Nonexistence of certain spherical designs of odd strengths and cardinalities (Q1283747) (← links)
- On lower bounds on the size of designs in compact symmetric spaces of rank 1 (Q1359065) (← links)
- CAPA: the spirit of beaver against physical attacks (Q1673385) (← links)
- Masking AES with \(d+1\) shares in hardware (Q1695972) (← links)
- On the non-minimal codewords in binary Reed-Muller codes (Q1811092) (← links)
- Improvement of the Delsarte bound for \(\tau\)-designs when it is not the best bound possible (Q1869830) (← links)
- Resilient uniformity: applying resiliency in masking (Q2130025) (← links)
- Decomposition of permutations in a finite field (Q2632833) (← links)
- Constructions of S-boxes with uniform sharing (Q2632834) (← links)
- Whirlwind: a new cryptographic hash function (Q2638401) (← links)
- Practically efficient secure distributed exponentiation without bit-decomposition (Q2656944) (← links)
- (Q2741451) (← links)
- Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm (Q2802413) (← links)
- KLEIN: A New Family of Lightweight Block Ciphers (Q2902465) (← links)
- Higher-Order Threshold Implementations (Q2936616) (← links)
- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box (Q2947102) (← links)
- Privacy Enhanced Access Control by Means of Policy Blinding (Q3001868) (← links)
- Public-Key Encryption with Delegated Search (Q3011319) (← links)
- Consolidating Masking Schemes (Q3457138) (← links)
- (Q3508962) (← links)
- (Q3508963) (← links)
- Threshold Implementations Against Side-Channel Attacks and Glitches (Q3535346) (← links)
- Using Normal Bases for Compact Hardware Implementations of the AES S-Box (Q3540049) (← links)
- Classification of cubic (n-4)-resilient Boolean functions (Q3546604) (← links)
- On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions (Q3547829) (← links)
- Searching Keywords with Wildcards on Encrypted Data (Q3588337) (← links)
- (Q3597515) (← links)
- (Q3597516) (← links)
- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches (Q3617507) (← links)
- Strongly Multiplicative Hierarchical Threshold Secret Sharing (Q3649196) (← links)
- Towards Secure and Practical MACs for Body Sensor Networks (Q3652320) (← links)
- (Q3838680) (← links)
- (Q3838752) (← links)
- (Q4414276) (← links)
- (Q4417422) (← links)
- (Q4417425) (← links)
- (Q4501013) (← links)
- (Q4504299) (← links)
- Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces (Q4550268) (← links)
- Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes (Q4649770) (← links)
- (Q4945348) (← links)
- (Q4954425) (← links)
- A More Efficient AES Threshold Implementation (Q4981773) (← links)
- On the Sixth International Olympiad in Cryptography NSUCRYPTO (Q5090166) (← links)
- PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY (Q5150699) (← links)