Threshold implementations against side-channel attacks and glitches S Nikova, C Rechberger, V Rijmen Information and Communications Security, 529-545, 2006 | 611 | 2006 |
KLEIN: a new family of lightweight block ciphers Z Gong, S Nikova, Y Law RFID. Security and Privacy, 1-18, 2012 | 579 | 2012 |
Secure hardware implementation of non-linear functions in the presence of glitches S Nikova, V Rijmen, M Schläffer Information Security and Cryptology–ICISC 2008, 218-234, 2009 | 402 | 2009 |
Mediated ciphertext-policy attribute-based encryption and its application L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Information Security Applications: 10th International Workshop, WISA 2009 …, 2009 | 336 | 2009 |
Consolidating masking schemes O Reparaz, B Bilgin, S Nikova, B Gierlichs, I Verbauwhede Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 285 | 2015 |
Higher-order threshold implementations B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 234 | 2014 |
Masking AES with shares in hardware T De Cnudde, O Reparaz, B Bilgin, S Nikova, V Nikov, V Rijmen International Conference on Cryptographic Hardware and Embedded Systems, 194-212, 2016 | 175 | 2016 |
A more efficient AES threshold implementation B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014 | 168 | 2014 |
Threshold implementations of all 3× 3 and 4× 4 S-boxes B Bilgin, S Nikova, V Nikov, V Rijmen, G Stütz International workshop on cryptographic hardware and embedded systems, 76-91, 2012 | 155 | 2012 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker IEEE Trans. Image process, 2009 | 115 | 2009 |
Trade-offs for threshold implementations illustrated on AES B Bilgin, B Gierlichs, S Nikova, V Nikov, V Rijmen IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2015 | 103 | 2015 |
Efficient and First-Order DPA Resistant Implementations of Keccak B Bilgin, J Daemen, V Nikov, S Nikova, V Rijmen, G Van Assche Smart Card Research and Advanced Applications: 12th International Conference …, 2014 | 92 | 2014 |
Does coupling affect the security of masked implementations? T De Cnudde, B Bilgin, B Gierlichs, V Nikov, S Nikova, V Rijmen Constructive Side-Channel Analysis and Secure Design: 8th International …, 2017 | 87 | 2017 |
Searching keywords with wildcards on encrypted data S Sedghi, P Van Liesdonk, S Nikova, P Hartel, W Jonker Security and Cryptography for Networks: 7th International Conference, SCN …, 2010 | 87 | 2010 |
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties G Ivanov, N Nikolov, S Nikova Cryptography and Communications 8, 247-276, 2016 | 85 | 2016 |
Threshold implementations of small S-boxes B Bilgin, S Nikova, V Nikov, V Rijmen, N Tokareva, V Vitkup Cryptography and Communications 7, 3-33, 2015 | 81 | 2015 |
Public-key encryption with delegated search L Ibraimi, S Nikova, P Hartel, W Jonker International Conference on Applied Cryptography and Network Security, 532-549, 2011 | 72 | 2011 |
Higher-order threshold implementation of the AES S-box T De Cnudde, B Bilgin, O Reparaz, V Nikov, S Nikova Smart Card Research and Advanced Applications: 14th International Conference …, 2016 | 71 | 2016 |
Cryptographically strong S-boxes generated by modified immune algorithm G Ivanov, N Nikolov, S Nikova Cryptography and Information Security in the Balkans: Second International …, 2016 | 67 | 2016 |
On proactive secret sharing schemes V Nikov, S Nikova International Workshop on Selected Areas in Cryptography, 308-325, 2004 | 64 | 2004 |