From 5-pass-based identification to-based signatures MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe International Conference on the Theory and Application of Cryptology and …, 2016 | 137* | 2016 |
Chosen ciphertext k-trace attacks on masked CCA2 secure Kyber M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ... IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021 | 59 | 2021 |
Practical multi-party private set intersection protocols A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos IEEE Transactions on Information Forensics and Security 17, 1-15, 2021 | 52 | 2021 |
Take your MEDS: digital signatures from matrix code equivalence T Chou, R Niederhagen, E Persichetti, TH Randrianarisoa, K Reijnders, ... International conference on cryptology in Africa, 28-52, 2023 | 36 | 2023 |
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation N Lahr, R Niederhagen, R Petri, S Samardjiska International Conference on the Theory and Application of Cryptology and …, 2020 | 34 | 2020 |
A reaction attack against cryptosystems based on LRPC codes S Samardjiska, P Santini, E Persichetti, G Banegas Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019 | 29 | 2019 |
A polynomial-time key-recovery attack on MQQ cryptosystems JC Faugère, D Gligoroski, L Perret, S Samardjiska, E Thomae IACR International Workshop on Public Key Cryptography, 150-174, 2015 | 28 | 2015 |
Hardness estimates of the code equivalence problem in the rank metric K Reijnders, S Samardjiska, M Trimoska Designs, Codes and Cryptography 92 (3), 833-862, 2024 | 26 | 2024 |
McEliece in the world of Escher D Gligoroski, S Samardjiska, H Jacobsen, S Bezzateev Cryptology ePrint Archive, 2014 | 26 | 2014 |
MQDSS specifications MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe Sl: mqdss. org, 2021 | 25 | 2021 |
SOFIA: MQ-Based Signatures in the QROM MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe IACR International Workshop on Public Key Cryptography, 3-33, 2018 | 24 | 2018 |
SOFIA: MQ-based signatures in the QROM MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe https://eprint.iacr.org/2017/680, 2017 | 24 | 2017 |
π-cipher v2. 0 D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ... Cryptographic competitions: CAESAR, 2014 | 22 | 2014 |
π-Cipher: Authenticated Encryption for Big Data D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ... Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014 | 20 | 2014 |
Multivariate quasigroups defined by t-functions S Samardjiska, S Markovski, D Gligoroski Conference on Symbolic Computation and Cryptography, 117, 2010 | 17 | 2010 |
Mqdss S Samardjiska, MS Chen, A Hulsing, J Rijneveld, P Schwabe technical report, national institute of standards and technology, 2019 | 15 | 2019 |
Separating oil and vinegar with a single trace: side-channel assisted Kipnis-Shamir attack on UOV T Aulbach, F Campos, J Krämer, S Samardjiska, M Stöttinger IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (3 …, 2023 | 14 | 2023 |
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 … JH Cheon, T Takagi Springer, 2016 | 14 | 2016 |
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields S Samardjiska, Y Chen, D Gligoroski 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 14 | 2011 |
Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3 H Mihajloska, D Gligoroski, S Samardjiska International Workshop on Open Problems in Network Security, 97-111, 2015 | 13 | 2015 |