Dr. Svetla Petkova-Nikova


Home Research Publications Projects Teaching Other Activities

KU Leuven, ESAT-COSIC
Kasteelpark Arenberg 10
B-3001 Leuven-Heverlee
Belgium

Tel: +32 16 32 96 18
Fax: +32 16 32 19 69
E-mail: svetla.nikova@esat.kuleuven.be
PGP key

I have a position as Research Expert (Onderzoekskader) at the research group COSIC in the Electrical Eng. Dept. of KU Leuven, Belgium.
Prior to that I was Assistant Professor in University of Twente, NL.
My Ph. D. degree is from Eindhoven University of Technology, the Netherlands. My thesis is about "Bounds for Designs in Infinite Polynomial Metric Spaces". My M. Sc. degree is from Sofia University St. Kliment Ohridski, Sofia, Bulgaria.

NEWS!

Verification Tool VerMFi

TI Tools for the 3x3 and 4x4 S-boxes

Selected Recent Publications

  • V. Arribas, S. Nikova, and V. Rijmen, VerMI: Verification Tool for Masked Implementations, In International Conference on Electronics, Circuits, and Systems, IEEE, 4 pages, 2018.
  • L. De Meyer, V. Arribas, V. Nikov, S. Nikova, and V. Rijmen, M&M: Masks and Macs against Physical Attacks, Transactions on Cryptographic Hardware and Embedded Systems 2019(1), pp. 25-50, 2019.
  • V. Arribas, B. Bilgin, S. Nikova, G. Petrides, and V. Rijmen, Rhythmic Keccak: SCA Security and Low Latency in HW, Transactions on Cryptographic Hardware and Embedded Systems 2018(1), 22 pages, 2018.
  • O. Reparaz, L. De Meyer, B. Bilgin, V. Arribas, V. Nikov, S. Nikova, and N. Smart, CAPA: The Spirit of Beaver against Physical Attacks,In Advances in Cryptology - CRYPTO 2018, Lecture Notes in Computer Science, Springer-Verlag, pp. 121-151, 2018.8.
  • A. Aly, A. Abidin, and S. Nikova, Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition, In Financial Cryptography and Data Security, FC 2018, Lecture Notes in Computer Science, S. Meiklejohn, and K. Sako (eds.), Springer-Verlag, 18 pages, 2018.
  • V. Arribas, B. Bilgin, S. Nikova, G. Petrides, and V. Rijmen, Rhythmic Keccak: SCA Security and Low Latency in HW , Transactions on Cryptographic Hardware and Embedded Systems 2018(1), 22 pages, 2018.
  • T. De Cnudde, B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, Does Coupling Affect the Security of Masked Implementations? In Workshop on Constructive Side-Channel Analysis and Secure Design 2017, Lecture Notes in Computer Science LNCS, S. Guilley (ed.), Springer-Verlag, 17 pages, 2017.
  • T. De Cnudde, O. Reparaz, B. Bilgin, S. Nikova, V. Nikov, and V. Rijmen, Masking AES with d+1 Shares in Hardware, In Cryptographic Hardware and Embedded Systems - CHES 2016, Lecture Notes in Computer Science 9813, B. Gierlichs, and A. Poschmann (eds.), Springer-Verlag, 21 pages, 2016.
  • T. De Cnudde, and S. Nikova, More Efficient Private Circuits II Through Threshold Implementations, In International Workshop on Fault Diagnosis and Tolerance in Cryptography 2016 Conference Publishing Service, P. Maurine, and M. Tunstall (eds.), IEEE, 11 pages, 2016.
  • G. Ivanov, N. Nikolov, and S. Nikova, Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties, Cryptography and Communications 8(2), pp. 247-276, 2016.
  • B. Bilgin, M. Knezevic, V. Nikov, and S. Nikova, Compact Implementations of Multi-Sbox Designs, In Smart Card Research and Advanced Applications - CARDIS 2015, Lecture Notes in Computer Science LNCS, N. Homma, and M. Medwed (eds.), Springer-Verlag, 16 pages, 2015.
  • T. De Cnudde, B. Bilgin, O. Reparaz, V. Nikov, and S. Nikova, Higher-Order Threshold Implementation of the AES S-box, In Smart Card Research and Advanced Applications - CARDIS 2015, Lecture Notes in Computer Science LNCS, N. Homma, and M. Medwed (eds.), Springer-Verlag, 16 pages, 2015.
  • O. Reparaz, B. Bilgin, B. Gierlichs, S. Nikova, and I. Verbauwhede, Consolidating Masking Schemes, In Advances in Cryptology - CRYPTO 2015, Lecture Notes in Computer Science 9215, R. Gennaro, and M. J. Robshaw (eds.), Springer-Verlag, pp. 764-783, 2015.
  • B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, Trade-offs for Threshold Implementations Illustrated on AES, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(7), pp. 1188-1200, 2015.
  • B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, Higher Order Threshold Implementations, In Advances in Cryptology - ASIACRYPT 2014, Lecture Notes in Computer Science 8873, T. Iwata, and P. Sarkar (eds.), Springer-Verlag, pp. 326-343, 2014.
  • B. Bilgin, S. Nikova, V. Nikov, V. Rijmen, N. Tokareva, V. Vitkup, Threshold Implementations of Small S-boxes, Cryptography and Communications 7(1), pp. 3-33, 2015, Special Issue on Discrete Structures, Boolean Functions and Sequences.
  • B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, A More Efficient AES Threshold Implementation, AFRICACRYPT 2014, Lecture Notes in Computer Science 8469, D. Pointcheval, and D. Vergnaud (eds.), Springer-Verlag, pp. 267-284, 2014.
  • B. Bilgin, J. Daemen, V. Nikov, S. Nikova, V. Rijmen, and G. Van Assche, Efficient and First-Order DPA Resistant Implementations of Keccak, In Smart Card Research and Advanced Applications, CARDIS 2013, Lecture Notes in Computer Science, Springer-Verlag, 15 pages, 2013
  • B. Bilgin, S. Nikova, V. Nikov, V. Rijmen and G. Stütz, Threshold Implementations of all 3x3 and 4x4 S-boxes, CHES 2012, Lecture Notes in Computer Science 7428, E. Prouff, and P. Schaumont (eds.), Springer-Verlag, pp. 76-91, 2012.
  • S. Nikova, V. Rijmen, and M. Schläffer, Secure Hardware Implementation of Nonlinear Functions in the Presence of Glitches, Special Issue on Hardware and Security of Journal of Cryptology, Volume 24, Issue 2 (2011), pp. 292-319, 2011. [2.265]
  • Last modified: 04/11/2018