Follow
Simona Samardjiska
Simona Samardjiska
Digital Security Group, Radboud University, The Netherlands & Faculty of Computer Science and
Verified email at finki.ukim.mk
Title
Cited by
Cited by
Year
From 5-pass-based identification to-based signatures
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
International Conference on the Theory and Application of Cryptology and …, 2016
131*2016
Chosen ciphertext k-trace attacks on masked cca2 secure kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
462021
Practical multi-party private set intersection protocols
A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos
IEEE Transactions on Information Forensics and Security 17, 1-15, 2021
292021
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation
N Lahr, R Niederhagen, R Petri, S Samardjiska
International Conference on the Theory and Application of Cryptology and …, 2020
292020
A polynomial-time key-recovery attack on MQQ cryptosystems
JC Faugère, D Gligoroski, L Perret, S Samardjiska, E Thomae
IACR International Workshop on Public Key Cryptography, 150-174, 2015
282015
McEliece in the world of Escher
D Gligoroski, S Samardjiska, H Jacobsen, S Bezzateev
Cryptology ePrint Archive, 2014
262014
A reaction attack against cryptosystems based on LRPC codes
S Samardjiska, P Santini, E Persichetti, G Banegas
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
252019
MQDSS specifications
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
Sl: mqdss. org, 2021
242021
SOFIA: MQ-Based Signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
IACR International Workshop on Public Key Cryptography, 3-33, 2018
232018
SOFIA: MQ-based signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
https://eprint.iacr.org/2017/680, 2017
232017
Take your MEDS: digital signatures from matrix code equivalence
T Chou, R Niederhagen, E Persichetti, TH Randrianarisoa, K Reijnders, ...
International Conference on Cryptology in Africa, 28-52, 2023
222023
π-cipher v2
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
222014
π-Cipher: Authenticated Encryption for Big Data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014
202014
Hardness estimates of the code equivalence problem in the rank metric
K Reijnders, S Samardjiska, M Trimoska
Designs, Codes and Cryptography, 1-30, 2024
182024
Multivariate quasigroups defined by t-functions
S Samardjiska, S Markovski, D Gligoroski
Conference on Symbolic Computation and Cryptography, 117, 2010
172010
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 …
JH Cheon, T Takagi
Springer, 2016
142016
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields
S Samardjiska, Y Chen, D Gligoroski
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
142011
Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3
H Mihajloska, D Gligoroski, S Samardjiska
International Workshop on Open Problems in Network Security, 97-111, 2015
132015
Identity sieves for quasigroups
S Markovski, V Dimitrova, S Samardjiska
QUASIGROUPS AND RELATED SYSTEMS 18 (2), 149-163, 2010
132010
Quadratic permutation polynomials, complete mappings and mutually orthogonal Latin squares
S Samardjiska, D Gligoroski
preprint, 2014
12*2014
The system can't perform the operation now. Try again later.
Articles 1–20