From 5-pass-based identification to-based signatures MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016 | 110* | 2016 |
MQDSS specifications MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe [Sl]: mqdss. org, 2021 | 24 | 2021 |
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. JC Faugère, D Gligoroski, L Perret, S Samardjiska, E Thomae Public Key Cryptography, 150-174, 2015 | 24 | 2015 |
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation N Lahr, R Niederhagen, R Petri, S Samardjiska Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 23 | 2020 |
A reaction attack against cryptosystems based on LRPC codes S Samardjiska, P Santini, E Persichetti, G Banegas Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019 | 23 | 2019 |
Chosen ciphertext k-trace attacks on masked CCA2 secure kyber M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021 | 22 | 2021 |
McEliece in the world of Escher D Gligoroski, S Samardjiska, H Jacobsen, S Bezzateev Cryptology ePrint Archive, 2014 | 20 | 2014 |
SOFIA: MQ-based signatures in the QROM MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe https://eprint.iacr.org/2017/680, 2017 | 18 | 2017 |
π-cipher v2 D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ... Cryptographic competitions: CAESAR, 2014 | 18 | 2014 |
Multivariate quasigroups defined by t-functions S Samardjiska, S Markovski, D Gligoroski Conference on Symbolic Computation and Cryptography, 117, 2010 | 18 | 2010 |
π-Cipher: Authenticated Encryption for Big Data D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ... Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014 | 17 | 2014 |
Practical multi-party private set intersection protocols A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos IEEE Transactions on Information Forensics and Security 17, 1-15, 2021 | 14 | 2021 |
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 … JH Cheon, T Takagi Springer, 2016 | 13 | 2016 |
Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3 H Mihajloska, D Gligoroski, S Samardjiska Open Problems in Network Security: IFIP WG 11.4 International Workshop …, 2016 | 13 | 2016 |
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields S Samardjiska, Y Chen, D Gligoroski 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 13 | 2011 |
Identity sieves for quasigroups S Markovski, V Dimitrova, S Samardjiska QUASIGROUPS AND RELATED SYSTEMS 18 (2), 149-163, 2010 | 13 | 2010 |
Quadratic permutation polynomials, complete mappings and mutually orthogonal Latin squares S Samardjiska, D Gligoroski preprint, 2014 | 10* | 2014 |
π-cipher v1. Cryptographic competitions: CAESAR (2014) D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ... | 8 | 2014 |
The multivariate probabilistic encryption scheme MQQ-ENC D Gligoroski, S Samardjiska Cryptology ePrint Archive, 2012 | 8 | 2012 |
Hardness estimates of the code equivalence problem in the rank metric K Reijnders, S Samardjiska, M Trimoska Cryptology ePrint Archive, 2022 | 7 | 2022 |