Obserwuj
Simona Samardjiska
Simona Samardjiska
Digital Security Group, Radboud University, The Netherlands & Faculty of Computer Science and
Zweryfikowany adres z finki.ukim.mk
Tytuł
Cytowane przez
Cytowane przez
Rok
From 5-pass-based identification to-based signatures
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
110*2016
MQDSS specifications
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
[Sl]: mqdss. org, 2021
242021
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
JC Faugère, D Gligoroski, L Perret, S Samardjiska, E Thomae
Public Key Cryptography, 150-174, 2015
242015
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation
N Lahr, R Niederhagen, R Petri, S Samardjiska
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
232020
A reaction attack against cryptosystems based on LRPC codes
S Samardjiska, P Santini, E Persichetti, G Banegas
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
232019
Chosen ciphertext k-trace attacks on masked CCA2 secure kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
222021
McEliece in the world of Escher
D Gligoroski, S Samardjiska, H Jacobsen, S Bezzateev
Cryptology ePrint Archive, 2014
202014
SOFIA: MQ-based signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
https://eprint.iacr.org/2017/680, 2017
182017
π-cipher v2
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
182014
Multivariate quasigroups defined by t-functions
S Samardjiska, S Markovski, D Gligoroski
Conference on Symbolic Computation and Cryptography, 117, 2010
182010
π-Cipher: Authenticated Encryption for Big Data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014
172014
Practical multi-party private set intersection protocols
A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos
IEEE Transactions on Information Forensics and Security 17, 1-15, 2021
142021
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 …
JH Cheon, T Takagi
Springer, 2016
132016
Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3
H Mihajloska, D Gligoroski, S Samardjiska
Open Problems in Network Security: IFIP WG 11.4 International Workshop …, 2016
132016
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields
S Samardjiska, Y Chen, D Gligoroski
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
132011
Identity sieves for quasigroups
S Markovski, V Dimitrova, S Samardjiska
QUASIGROUPS AND RELATED SYSTEMS 18 (2), 149-163, 2010
132010
Quadratic permutation polynomials, complete mappings and mutually orthogonal Latin squares
S Samardjiska, D Gligoroski
preprint, 2014
10*2014
π-cipher v1. Cryptographic competitions: CAESAR (2014)
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
82014
The multivariate probabilistic encryption scheme MQQ-ENC
D Gligoroski, S Samardjiska
Cryptology ePrint Archive, 2012
82012
Hardness estimates of the code equivalence problem in the rank metric
K Reijnders, S Samardjiska, M Trimoska
Cryptology ePrint Archive, 2022
72022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20