Svetla Nikova

From MaRDI portal
Person:269569

Available identifiers

zbMath Open nikova.svetla-jordanovaDBLP24/3255WikidataQ22022501 ScholiaQ22022501MaRDI QIDQ269569

List of research outcomes





PublicationDate of PublicationType
CAPABARA: a combined attack on CAPA2024-10-31Paper
The random fault model2024-10-16Paper
An optimal universal construction for the threshold implementation of bijective S-boxes2024-07-19Paper
On the Sixth International Olympiad in Cryptography NSUCRYPTO2022-07-15Paper
Resilient uniformity: applying resiliency in masking2022-04-25Paper
Practically efficient secure distributed exponentiation without bit-decomposition2021-03-17Paper
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY2021-02-15Paper
My gadget just cares for me -- how NINA can prove security against combined attacks2020-08-05Paper
Decomposition of permutations in a finite field2019-05-15Paper
Constructions of S-boxes with uniform sharing2019-05-15Paper
CAPA: the spirit of beaver against physical attacks2018-09-12Paper
Masking AES with \(d+1\) shares in hardware2018-02-14Paper
Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm2016-04-26Paper
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties2016-04-19Paper
Consolidating Masking Schemes2015-12-10Paper
Threshold implementations of small S-boxes2015-11-18Paper
Higher-Order Glitch Resistant Implementation of the PRESENT S-Box2015-09-21Paper
Higher-Order Threshold Implementations2015-01-06Paper
A More Efficient AES Threshold Implementation2014-06-24Paper
Threshold Implementations of All 3 ×3 and 4 ×4 S-Boxes2012-11-13Paper
KLEIN: A New Family of Lightweight Block Ciphers2012-08-20Paper
Secure hardware implementation of nonlinear functions in the presence of glitches2012-01-18Paper
Public-Key Encryption with Delegated Search2011-06-28Paper
Privacy Enhanced Access Control by Means of Policy Blinding2011-05-19Paper
Whirlwind: a new cryptographic hash function2010-09-16Paper
Searching Keywords with Wildcards on Encrypted Data2010-09-10Paper
Towards secure and practical MACs for body sensor networks2009-12-17Paper
Strongly multiplicative hierarchical threshold secret sharing2009-12-03Paper
Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches2009-03-24Paper
On Boolean functions with generalized cryptographic properties2009-02-09Paper
Classification of the cosets of \(\text{RM}(1,7)\) in \(\text{RM}(3,7)\) revisited2009-02-09Paper
On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions2008-12-21Paper
Classification of cubic (n-4)-resilient Boolean functions2008-12-21Paper
Using Normal Bases for Compact Hardware Implementations of the AES S-Box2008-11-20Paper
Threshold Implementations Against Side-Channel Attacks and Glitches2008-11-11Paper
https://portal.mardi4nfdi.de/entity/Q35089622008-07-01Paper
On proactive verifiable secret sharing schemes2008-07-01Paper
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols2008-04-24Paper
Applied Cryptography and Network Security2008-02-19Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Cryptography and Coding2007-11-28Paper
Coding and Cryptography2007-05-02Paper
Security in Communication Networks2006-10-10Paper
Selected Areas in Cryptography2006-10-10Paper
Computing and Combinatorics2006-01-11Paper
Automata, Languages and Programming2006-01-10Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q44174222003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44174252003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44142762003-07-24Paper
On the non-minimal codewords in binary Reed-Muller codes2003-06-10Paper
Improvement of the Delsarte bound for \(\tau\)-designs when it is not the best bound possible2003-04-28Paper
Improvement of the Delsarte Bound for τ-Designs in Finite Polynomial Metric Spaces2002-11-12Paper
On the non-minimal codewords of weight \(2d_{\min}\) in the binary Reed-Muller code2001-10-15Paper
https://portal.mardi4nfdi.de/entity/Q45042992000-09-13Paper
https://portal.mardi4nfdi.de/entity/Q45010132000-09-03Paper
https://portal.mardi4nfdi.de/entity/Q49544252000-06-07Paper
https://portal.mardi4nfdi.de/entity/Q49453482000-06-07Paper
Nonexistence of certain spherical designs of odd strengths and cardinalities1999-03-30Paper
https://portal.mardi4nfdi.de/entity/Q38387521998-10-28Paper
https://portal.mardi4nfdi.de/entity/Q38386801998-08-13Paper
On lower bounds on the size of designs in compact symmetric spaces of rank 11997-09-24Paper

Research outcomes over time

This page was built for person: Svetla Nikova