Follow
Simona Samardjiska
Simona Samardjiska
Digital Security Group, Radboud University, The Netherlands & Faculty of Computer Science and
Verified email at finki.ukim.mk
Title
Cited by
Cited by
Year
From 5-pass-based identification to-based signatures
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
International Conference on the Theory and Application of Cryptology and …, 2016
134*2016
Chosen ciphertext k-trace attacks on masked CCA2 secure Kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
542021
Practical multi-party private set intersection protocols
A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos
IEEE Transactions on Information Forensics and Security 17, 1-15, 2021
442021
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation
N Lahr, R Niederhagen, R Petri, S Samardjiska
International Conference on the Theory and Application of Cryptology and …, 2020
342020
A reaction attack against cryptosystems based on LRPC codes
S Samardjiska, P Santini, E Persichetti, G Banegas
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
282019
A polynomial-time key-recovery attack on MQQ cryptosystems
JC Faugère, D Gligoroski, L Perret, S Samardjiska, E Thomae
IACR International Workshop on Public Key Cryptography, 150-174, 2015
282015
McEliece in the world of Escher
D Gligoroski, S Samardjiska, H Jacobsen, S Bezzateev
Cryptology ePrint Archive, 2014
262014
Take your MEDS: digital signatures from matrix code equivalence
T Chou, R Niederhagen, E Persichetti, TH Randrianarisoa, K Reijnders, ...
International conference on cryptology in Africa, 28-52, 2023
252023
MQDSS specifications
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
Sl: mqdss. org, 2021
252021
SOFIA: MQ-Based Signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
IACR International Workshop on Public Key Cryptography, 3-33, 2018
232018
SOFIA: MQ-based signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
https://eprint.iacr.org/2017/680, 2017
232017
Hardness estimates of the code equivalence problem in the rank metric
K Reijnders, S Samardjiska, M Trimoska
Designs, Codes and Cryptography 92 (3), 833-862, 2024
222024
π-cipher v2. 0
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
222014
π-Cipher: Authenticated Encryption for Big Data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014
202014
Multivariate quasigroups defined by t-functions
S Samardjiska, S Markovski, D Gligoroski
Conference on Symbolic Computation and Cryptography, 117, 2010
172010
Mqdss
S Samardjiska, MS Chen, A Hulsing, J Rijneveld, P Schwabe
technical report, national institute of standards and technology, 2019
142019
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 …
JH Cheon, T Takagi
Springer, 2016
142016
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields
S Samardjiska, Y Chen, D Gligoroski
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
142011
Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3
H Mihajloska, D Gligoroski, S Samardjiska
International Workshop on Open Problems in Network Security, 97-111, 2015
132015
Quadratic permutation polynomials, complete mappings and mutually orthogonal Latin squares
S Samardjiska, D Gligoroski
preprint, 2014
13*2014
The system can't perform the operation now. Try again later.
Articles 1–20