Follow
Simona Samardjiska
Simona Samardjiska
Digital Security Group, Radboud University, The Netherlands & Faculty of Computer Science and
Verified email at finki.ukim.mk
Title
Cited by
Cited by
Year
From 5-Pass -Based Identification to -Based Signatures
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
International Conference on the Theory and Application of Cryptology and …, 2016
98*2016
A polynomial-time key-recovery attack on MQQ cryptosystems
JC Faugère, D Gligoroski, L Perret, S Samardjiska, E Thomae
IACR International Workshop on Public Key Cryptography, 150-174, 2015
252015
MQDSS specifications
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
Sl: mqdss. org, 2021
202021
McEliece in the world of Escher
D Gligoroski, S Samardjiska, H Jacobsen, S Bezzateev
Cryptology ePrint Archive, 2014
202014
π-cipher v2
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
182014
Side channel information set decoding using iterative chunking
N Lahr, R Niederhagen, R Petri, S Samardjiska
International Conference on the Theory and Application of Cryptology and …, 2020
162020
A reaction attack against cryptosystems based on LRPC codes
S Samardjiska, P Santini, E Persichetti, G Banegas
International Conference on Cryptology and Information Security in Latin …, 2019
162019
SOFIA: -Based Signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
IACR International Workshop on Public Key Cryptography, 3-33, 2018
162018
SOFIA: MQ-based signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
https://eprint.iacr.org/2017/680, 2017
16*2017
Multivariate quasigroups defined by t-functions
S Samardjiska, S Markovski, D Gligoroski
Conference on Symbolic Computation and Cryptography, 117, 2010
162010
π-cipher: Authenticated encryption for big data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Nordic Conference on Secure IT Systems, 110-128, 2014
152014
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 …
JH Cheon, T Takagi
Springer, 2016
122016
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields
S Samardjiska, Y Chen, D Gligoroski
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
122011
Identity sieves for quasigroups
S Markovski, V Dimitrova, S Samardjiska
QUASIGROUPS AND RELATED SYSTEMS 18 (2), 149-163, 2010
122010
Reviving the idea of incremental cryptography for the zettabyte era use case: Incremental hash functions based on SHA-3
H Mihajloska, D Gligoroski, S Samardjiska
International Workshop on Open Problems in Network Security, 97-111, 2015
112015
Chosen ciphertext k-trace attacks on masked CCA2 secure kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
102021
Quadratic permutation polynomials, complete mappings and mutually orthogonal Latin squares
S Samardjiska, D Gligoroski
preprint, 2014
8*2014
Mqdss
S Samardjiska, MS Chen, A Hulsing, J Rijneveld, P Schwabe
technical report, national institute of standards and technology, 2019
72019
π-cipher v1. Cryptographic competitions: CAESAR (2014)
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
72014
Algorithms for Construction of Multivariate Quadratic Quasigroups (MQQs) and Their Parastrophe Operations in Arbitrary Galois Fields.
S Samardjiska, Y Chen, D Gligoroski
Journal of Information Assurance & Security 7 (3), 2012
72012
The system can't perform the operation now. Try again later.
Articles 1–20