Svetla Nikova

From MaRDI portal
Person:269569

Available identifiers

zbMath Open nikova.svetla-jordanovaWikidataQ22022501 ScholiaQ22022501MaRDI QIDQ269569

List of research outcomes

PublicationDate of PublicationType
On the Sixth International Olympiad in Cryptography NSUCRYPTO2022-07-15Paper
Resilient uniformity: applying resiliency in masking2022-04-25Paper
Practically efficient secure distributed exponentiation without bit-decomposition2021-03-17Paper
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY2021-02-15Paper
My gadget just cares for me -- how NINA can prove security against combined attacks2020-08-05Paper
Decomposition of permutations in a finite field2019-05-15Paper
Constructions of S-boxes with uniform sharing2019-05-15Paper
CAPA: the spirit of beaver against physical attacks2018-09-12Paper
Masking AES with \(d+1\) shares in hardware2018-02-14Paper
Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm2016-04-26Paper
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties2016-04-19Paper
Consolidating Masking Schemes2015-12-10Paper
Threshold implementations of small S-boxes2015-11-18Paper
Higher-Order Glitch Resistant Implementation of the PRESENT S-Box2015-09-21Paper
Higher-Order Threshold Implementations2015-01-06Paper
A More Efficient AES Threshold Implementation2014-06-24Paper
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes2012-11-13Paper
KLEIN: A New Family of Lightweight Block Ciphers2012-08-20Paper
Secure hardware implementation of nonlinear functions in the presence of glitches2012-01-18Paper
Public-Key Encryption with Delegated Search2011-06-28Paper
Privacy Enhanced Access Control by Means of Policy Blinding2011-05-19Paper
Whirlwind: a new cryptographic hash function2010-09-16Paper
Searching Keywords with Wildcards on Encrypted Data2010-09-10Paper
Towards Secure and Practical MACs for Body Sensor Networks2009-12-17Paper
Strongly Multiplicative Hierarchical Threshold Secret Sharing2009-12-03Paper
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches2009-03-24Paper
https://portal.mardi4nfdi.de/entity/Q35975152009-02-09Paper
https://portal.mardi4nfdi.de/entity/Q35975162009-02-09Paper
Classification of cubic (n-4)-resilient Boolean functions2008-12-21Paper
On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions2008-12-21Paper
Using Normal Bases for Compact Hardware Implementations of the AES S-Box2008-11-20Paper
Threshold Implementations Against Side-Channel Attacks and Glitches2008-11-11Paper
https://portal.mardi4nfdi.de/entity/Q35089622008-07-01Paper
https://portal.mardi4nfdi.de/entity/Q35089632008-07-01Paper
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols2008-04-24Paper
Applied Cryptography and Network Security2008-02-19Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Cryptography and Coding2007-11-28Paper
Coding and Cryptography2007-05-02Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Computing and Combinatorics2006-01-11Paper
Automata, Languages and Programming2006-01-10Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44174222003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44174252003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44142762003-07-24Paper
On the non-minimal codewords in binary Reed-Muller codes2003-06-10Paper
Improvement of the Delsarte bound for \(\tau\)-designs when it is not the best bound possible2003-04-28Paper
Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces2002-11-12Paper
https://portal.mardi4nfdi.de/entity/Q27414512001-10-15Paper
https://portal.mardi4nfdi.de/entity/Q45042992000-09-13Paper
https://portal.mardi4nfdi.de/entity/Q45010132000-09-03Paper
https://portal.mardi4nfdi.de/entity/Q49453482000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q49544252000-06-07Paper
Nonexistence of certain spherical designs of odd strengths and cardinalities1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q38387521998-10-28Paper
https://portal.mardi4nfdi.de/entity/Q38386801998-08-13Paper
On lower bounds on the size of designs in compact symmetric spaces of rank 11997-09-24Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Svetla Nikova