Research
My research interests are in cryptography and coding theory:
- Cryptography
- Light-weight cryptography
- Side channel resistant implementations
- Boolean functions used in Block Ciphers (S-boxes)
- Secret Sharing Schemes, Commitment Schemes
- Multiparty Computation, Oblivious Transfer
- Resilient and Correlation-Immune Functions
- Coding Theory
- Codes and Designs in Polynomial Metric Spaces
- Linear Programming Bounds for Codes and Designs
- Covering Radius
- Minimal Codewords
- Reed–Muller Codes
Biography
I have a Research Expert position in COSIC.
Prior to that I was Assistant Professor in University of Twente, NL.
My Ph. D. degree is from Eindhoven University of Technology, the Netherlands.
My M. Sc. degree is from Sofia University St. Kliment Ohridski, Sofia, Bulgaria.
Publications
1. | T. De Cnudde, B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "Does Coupling Affect the Security of Masked Implementations?," In Workshop on Constructive Side-Channel Analysis and Secure Design 2017, Lecture Notes in Computer Science LNCS, S. Guilley (ed.), Springer-Verlag, 17 pages, 2017. |
2. | T. De Cnudde, O. Reparaz, B. Bilgin, S. Nikova, V. Nikov, and V. Rijmen, "Masking AES with d+1 Shares in Hardware - Abstract," In TIS '16 Proceedings of the 2016 ACM Workshop on Theory of Implementation Security, B. Bilgin, S. Nikova, and V. Rijmen (eds.), ACM, pp. 43-43, 2016. |
3. | "TIS '16 Proceedings of the 2016 ACM Workshop on Theory of Implementation Security", B. Bilgin, S. Nikova, and V. Rijmen (eds.), ACM, 2016. |
4. | T. De Cnudde, O. Reparaz, B. Bilgin, S. Nikova, V. Nikov, and V. Rijmen, "Masking AES with d+1 Shares in Hardware," In Cryptographic Hardware and Embedded Systems - CHES 2016, Lecture Notes in Computer Science 9813, B. Gierlichs, and A. Poschmann (eds.), Springer-Verlag, pp. 194-212, 2016. |
5. | T. De Cnudde, and S. Nikova, "More Efficient Private Circuits II Through Threshold Implementations," In International Workshop on Fault Diagnosis and Tolerance in Cryptography 2016 Conference Publishing Service, P. Maurine, and M. Tunstall (eds.), IEEE, pp. 114-124, 2016. |
6. | G. Ivanov, N. Nikolov, and S. Nikova, "Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm," In BalkanCryptSec 2015, Lecture Notes in Computer Science 9540, L. R. Knudsen, and E. Pasalic (eds.), Springer-Verlag, pp. 31-42, 2016. |
7. | G. Ivanov, N. Nikolov, and S. Nikova, "Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties," Cryptography and Communications 8(2), pp. 247-276, 2016. |
8. | B. Bilgin, M. Knezevic, V. Nikov, and S. Nikova, "Compact Implementations of Multi-Sbox Designs," In Smart Card Research and Advanced Applications - CARDIS 2015, Lecture Notes in Computer Science 9514, N. Homma, and M. Medwed (eds.), Springer-Verlag, pp. 273-286, 2015. |
9. | T. De Cnudde, B. Bilgin, O. Reparaz, V. Nikov, and S. Nikova, "Higher-Order Threshold Implementation of the AES S-box," In Smart Card Research and Advanced Applications - CARDIS 2015, Lecture Notes in Computer Science 9514, N. Homma, and M. Medwed (eds.), Springer-Verlag, pp. 259-272, 2015. |
10. | O. Reparaz, B. Bilgin, B. Gierlichs, S. Nikova, and I. Verbauwhede, "Consolidating Masking Schemes," In Advances in Cryptology - CRYPTO 2015, Lecture Notes in Computer Science 9215, R. Gennaro, and M. J. Robshaw (eds.), Springer-Verlag, pp. 764-783, 2015. |
11. | B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, " Trade-offs for Threshold Implementations Illustrated on AES," IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 34(7), pp. 1188-1200, 2015. |
12. | B. Bilgin, V. Nikov, S. Nikova, V. Rijmen, N. Tokareva, and V. Vitkup, "Threshold Implementations of Small S-boxes," Cryptography and Communications 7(1), pp. 3-33, 2015. |
13. | B. Bilgin, B. Gierlichs, S. Nikova, V. Nikov, and V. Rijmen, "Higher-Order Threshold Implementations," In Advances in Cryptology - ASIACRYPT 2014, Lecture Notes in Computer Science 8873, T. Iwata, and P. Sarkar (eds.), Springer-Verlag, pp. 326-343, 2014. |
14. | T. De Cnudde, B. Bilgin, O. Reparaz, and S. Nikova, "Higher-Order Glitch Resistant Implementation of the PRESENT S-Box," In BalkanCryptSec 2014, Lecture Notes in Computer Science 9024, B. Ors, and B. Preneel (eds.), Springer-Verlag, pp. 75-93, 2014. |
15. | B. Bilgin, B. Gierlichs, V. Nikov, S. Nikova, and V. Rijmen, "A More Efficient AES Threshold Implementation," In Progress in Cryptology - AFRICACRYPT 2014, Lecture Notes in Computer Science 8469, D. Pointcheval, and D. Vergnaud (eds.), Springer-Verlag, pp. 267-284, 2014. |
16. | Z. Gong, P. Hartel, S. Nikova, and S. Tang, "TuLP:A Family of Lightweight Message Authentication Codes for Body Sensor Networks," Journal of Computer Science and Technology 29(1), pp. 53-68, 2014. |
17. | B. Bilgin, J. Daemen, V. Nikov, S. Nikova, V. Rijmen, and G. Van Assche, "Efficient and First-Order DPA Resistant Implementations of Keccak," In Smart Card Research and Advanced Applications - CARDIS 2013, Lecture Notes in Computer Science 8419, A. Francillon, and P. Rohatgi (eds.), Springer-Verlag, pp. 187-199, 2013. |
18. | B. Bilgin, V. Nikov, S. Nikova, and V. Rijmen, "Threshold Implementations of all 3x3 and 4x4 S-boxes," In Cryptographic Hardware and Embedded Systems - CHES 2012, Lecture Notes in Computer Science 7428, E. Prouff, and P. Schaumont (eds.), Springer-Verlag, pp. 76-91, 2012. |
19. | S. Sedghi, P. Hartel, W. Jonker , and S. Nikova, "Privacy Enhanced Access Control by Means of Policy Blinding," In Information Security Practice and Experience, 7th International Conference, ISPEC 2011, Lecture Notes in Computer Science 6672, Springer-Verlag, pp. 108-122, 2011. |
20. | Z. Gong, S. Nikova, and Y. Wei Law, "KLEIN: A New Family of Lightweight Block Ciphers.," In Workshop on RFID Security 2011, Lecture Notes in Computer Science 7055, K. Fu, A. Juels, and C. Paar (eds.), Springer-Verlag, pp. 1-18, 2011. |