Author of the publication

Trade-Offs for Threshold Implementations Illustrated on AES.

, , , , and . IEEE Trans. on CAD of Integrated Circuits and Systems, 34 (7): 1188-1200 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nikov, Ventzislav
add a person with the name Nikov, Ventzislav
 

Other publications of authors with the same name

Secret Sharing and Error Correcting., and . Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes, volume 23 of NATO Science for Peace and Security Series - D: Information and Communication Security, IOS Press, (2009)Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -., , and . IACR Cryptology ePrint Archive, (2014)M&M: Masks and Macs against Physical Attacks., , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019 (1): 25-50 (2019)Applying General Access Structure to Metering Schemes., , , and . IACR Cryptology ePrint Archive, (2002)Compact Implementations of Multi-Sbox Designs., , , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 273-285. Springer, (2015)Higher-Order Threshold Implementation of the AES S-Box., , , , and . CARDIS, volume 9514 of Lecture Notes in Computer Science, page 259-272. Springer, (2015)Higher-Order Threshold Implementations., , , , and . ASIACRYPT (2), volume 8874 of Lecture Notes in Computer Science, page 326-343. Springer, (2014)Improvement of the Delsarte Bound for tau-Designs in Finite Polynomial Metric Spaces., and . IMA Int. Conf., volume 2260 of Lecture Notes in Computer Science, page 191-204. Springer, (2001)Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case., , and . IACR Cryptology ePrint Archive, (2003)M&M: Masks and Macs against Physical Attacks., , , , and . IACR Cryptology ePrint Archive, (2018)