Follow
Simona Samardjiska
Simona Samardjiska
Digital Security Group, Radboud University, The Netherlands
Verified email at cs.ru.nl - Homepage
Title
Cited by
Cited by
Year
From 5-pass-based identification to-based signatures
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
International Conference on the Theory and Application of Cryptology and …, 2016
137*2016
Chosen ciphertext k-trace attacks on masked CCA2 secure Kyber
M Hamburg, J Hermelink, R Primas, S Samardjiska, T Schamberger, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems, 88-113, 2021
622021
Practical multi-party private set intersection protocols
A Bay, Z Erkin, JH Hoepman, S Samardjiska, J Vos
IEEE Transactions on Information Forensics and Security 17, 1-15, 2021
552021
Take your MEDS: digital signatures from matrix code equivalence
T Chou, R Niederhagen, E Persichetti, TH Randrianarisoa, K Reijnders, ...
International conference on cryptology in Africa, 28-52, 2023
382023
Side channel information set decoding using iterative chunking: Plaintext recovery from the “Classic McEliece” hardware reference implementation
N Lahr, R Niederhagen, R Petri, S Samardjiska
International Conference on the Theory and Application of Cryptology and …, 2020
342020
A reaction attack against cryptosystems based on LRPC codes
S Samardjiska, P Santini, E Persichetti, G Banegas
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
292019
SOFIA: MQ-Based Signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
IACR International Workshop on Public Key Cryptography, 3-33, 2018
282018
SOFIA: MQ-based signatures in the QROM
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
https://eprint.iacr.org/2017/680, 2017
282017
A polynomial-time key-recovery attack on MQQ cryptosystems
JC Faugère, D Gligoroski, L Perret, S Samardjiska, E Thomae
IACR International Workshop on Public Key Cryptography, 150-174, 2015
282015
McEliece in the world of Escher
D Gligoroski, S Samardjiska, H Jacobsen, S Bezzateev
Cryptology ePrint Archive, 2014
272014
Hardness estimates of the code equivalence problem in the rank metric
K Reijnders, S Samardjiska, M Trimoska
Designs, Codes and Cryptography 92 (3), 833-862, 2024
262024
MQDSS specifications
MS Chen, A Hülsing, J Rijneveld, S Samardjiska, P Schwabe
Sl: mqdss. org, 2021
262021
π-cipher v2. 0
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
222014
π-Cipher: Authenticated Encryption for Big Data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014
202014
Separating oil and vinegar with a single trace: side-channel assisted Kipnis-Shamir attack on UOV
T Aulbach, F Campos, J Krämer, S Samardjiska, M Stöttinger
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (3 …, 2023
172023
Multivariate quasigroups defined by t-functions
S Samardjiska, S Markovski, D Gligoroski
Conference on Symbolic Computation and Cryptography, 117, 2010
172010
Mqdss
S Samardjiska, MS Chen, A Hulsing, J Rijneveld, P Schwabe
technical report, national institute of standards and technology, 2019
152019
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016 …
JH Cheon, T Takagi
Springer, 2016
142016
Quadratic permutation polynomials, complete mappings and mutually orthogonal Latin squares
S Samardjiska, D Gligoroski
preprint, 2014
14*2014
Construction of multivariate quadratic quasigroups (mqqs) in arbitrary galois fields
S Samardjiska, Y Chen, D Gligoroski
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
142011
The system can't perform the operation now. Try again later.
Articles 1–20