Who Watches the Watchers: Attacking Glitch Detection Circuits
Askeland, Amund, Nikova, Svetla, Nikov, Ventzislav
Published in IACR transactions on cryptographic hardware and embedded systems (04.12.2023)
Published in IACR transactions on cryptographic hardware and embedded systems (04.12.2023)
Get full text
Journal Article
Whirlwind: a new cryptographic hash function
Barreto, Paulo, Nikov, Ventzislav, Nikova, Svetla, Rijmen, Vincent, Tischhauser, Elmar
Published in Designs, codes, and cryptography (01.08.2010)
Published in Designs, codes, and cryptography (01.08.2010)
Get full text
Journal Article
Decomposition of permutations in a finite field
Nikova, Svetla, Nikov, Ventzislav, Rijmen, Vincent
Published in Cryptography and communications (15.05.2019)
Published in Cryptography and communications (15.05.2019)
Get full text
Journal Article
Cyber Resilience for the Internet of Things: Implementations With Resilience Engines and Attack Classifications
Alvarenga, Eduardo, Brands, Jan R., Doliwa, Peter, den Hartog, Jerry, Kraft, Erik, Medwed, Marcel, Nikov, Ventzislav, Renes, Joost, Rosso, Martin, Schneider, Tobias, Veshchikov, Nikita
Published in IEEE transactions on emerging topics in computing (01.04.2024)
Published in IEEE transactions on emerging topics in computing (01.04.2024)
Get full text
Journal Article
Constructions of S-boxes with uniform sharing
Varici, Kerem, Nikova, Svetla, Nikov, Ventzislav, Rijmen, Vincent
Published in Cryptography and communications (15.05.2019)
Published in Cryptography and communications (15.05.2019)
Get full text
Journal Article
Threshold implementations of small S-boxes
Bilgin, Begül, Nikova, Svetla, Nikov, Ventzislav, Rijmen, Vincent, Tokareva, Natalia, Vitkup, Valeriya
Published in Cryptography and communications (01.03.2015)
Published in Cryptography and communications (01.03.2015)
Get full text
Journal Article
M&M: Masks and Macs against Physical Attacks
De Meyer, Lauren, Arribas, Victor, Nikova, Svetla, Nikov, Ventzislav, Rijmen, Vincent
Published in IACR transactions on cryptographic hardware and embedded systems (09.11.2018)
Published in IACR transactions on cryptographic hardware and embedded systems (09.11.2018)
Get full text
Journal Article
M M: Masks and Macs against Physical Attacks
Lauren De Meyer, Victor Arribas, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen
Published in IACR transactions on cryptographic hardware and embedded systems (01.11.2018)
Published in IACR transactions on cryptographic hardware and embedded systems (01.11.2018)
Get full text
Journal Article