Ivica Nikolic
Orcid: 0000-0001-9578-4837
According to our database1,
Ivica Nikolic
authored at least 57 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
2023
Proc. ACM Program. Lang., April, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2021
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
ACM Trans. Embed. Comput. Syst., 2019
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019
2018
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Opening pandora's box: Implication of RLUT on secure FPGA applications and IP security.
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017
2016
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Trans. Symmetric Cryptol., 2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
2015
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation.
IACR Cryptol. ePrint Arch., 2015
Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Cryptogr. Commun., 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Automatic Search for Related-Key Differential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008