default search action
Simona Samardjiska
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Hardness estimates of the code equivalence problem in the rank metric. Des. Codes Cryptogr. 92(3): 833-862 (2024) - [c19]Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-Code-Based Signature Schemes. PQCrypto (1) 2024: 107-134 - [c18]Thomas Aulbach, Simona Samardjiska, Monika Trimoska:
Practical Key-Recovery Attack on MQ-Sign and More. PQCrypto (2) 2024: 168-185 - [i23]Lars Ran, Simona Samardjiska, Monika Trimoska:
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem. IACR Cryptol. ePrint Arch. 2024: 364 (2024) - [i22]Tung Chou, Ruben Niederhagen, Lars Ran, Simona Samardjiska:
Reducing Signature Size of Matrix-code-based Signature Schemes. IACR Cryptol. ePrint Arch. 2024: 495 (2024) - [i21]Lars Ran, Simona Samardjiska:
Rare structures in tensor graphs - Bermuda triangles for cryptosystems based on the Tensor Isomorphism problem. IACR Cryptol. ePrint Arch. 2024: 1396 (2024) - 2023
- [j4]Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger:
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 221-245 (2023) - [j3]Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek:
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 287-317 (2023) - [c17]Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take Your MEDS: Digital Signatures from Matrix Code Equivalence. AFRICACRYPT 2023: 28-52 - [c16]Lars Ran, Simona Samardjiska, Monika Trimoska:
Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem. CBCrypto 2023: 84-103 - [i20]Julius Hermelink, Erik Mårtensson, Simona Samardjiska, Peter Pessl, Gabi Dreo Rodosek:
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors. IACR Cryptol. ePrint Arch. 2023: 98 (2023) - [i19]Thomas Aulbach, Fabio Campos, Juliane Krämer, Simona Samardjiska, Marc Stöttinger:
Separating Oil and Vinegar with a Single Trace. IACR Cryptol. ePrint Arch. 2023: 335 (2023) - [i18]Thomas Aulbach, Simona Samardjiska, Monika Trimoska:
Practical key-recovery attack on MQ-Sign. IACR Cryptol. ePrint Arch. 2023: 432 (2023) - 2022
- [j2]Aslí Bay, Zekeriya Erkin, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos:
Practical Multi-Party Private Set Intersection Protocols. IEEE Trans. Inf. Forensics Secur. 17: 1-15 (2022) - [i17]Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Hardness estimates of the Code Equivalence Problem in the Rank Metric. IACR Cryptol. ePrint Arch. 2022: 276 (2022) - [i16]Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Take your MEDS: Digital Signatures from Matrix Code Equivalence. IACR Cryptol. ePrint Arch. 2022: 1559 (2022) - 2021
- [j1]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 88-113 (2021) - [c15]Thom Wiggers, Simona Samardjiska:
Practically Solving LPN. ISIT 2021: 2399-2404 - [i15]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Cryptol. ePrint Arch. 2021: 956 (2021) - [i14]Thom Wiggers, Simona Samardjiska:
Practically Solving LPN. IACR Cryptol. ePrint Arch. 2021: 962 (2021) - 2020
- [c14]Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation. ASIACRYPT (1) 2020: 881-910
2010 – 2019
- 2019
- [c13]Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas:
A Reaction Attack Against Cryptosystems Based on LRPC Codes. LATINCRYPT 2019: 197-216 - [i13]Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas:
A Reaction Attack against Cryptosystems based on LRPC Codes. IACR Cryptol. ePrint Arch. 2019: 845 (2019) - [i12]Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding. IACR Cryptol. ePrint Arch. 2019: 1459 (2019) - 2018
- [c12]Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
SOFIA: MQ MQ -Based Signatures in the QROM. Public Key Cryptography (2) 2018: 3-33 - 2017
- [i11]Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
SOFIA: MQ-based signatures in the QROM. IACR Cryptol. ePrint Arch. 2017: 680 (2017) - 2016
- [c11]Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
From 5-Pass MQ -Based Identification to MQ -Based Signatures. ASIACRYPT (2) 2016: 135-165 - [c10]Danilo Gligoroski, Simona Samardjiska:
Semantic Security and Key-Privacy with Random Split of St-Gen Codes. CiE 2016: 105-114 - [c9]Simona Samardjiska, Danilo Gligoroski:
An encryption scheme based on Random Split of St-Gen codes. ISIT 2016: 800-804 - [i10]Simona Samardjiska, Danilo Gligoroski:
An Encryption Scheme based on Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 202 (2016) - [i9]Danilo Gligoroski, Simona Samardjiska:
Semantic Security and Key-Privacy With Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 218 (2016) - [i8]Danilo Gligoroski, Simona Samardjiska:
A Digital Signature Scheme Based on Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 391 (2016) - [i7]Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
From 5-pass MQ-based identification to MQ-based signatures. IACR Cryptol. ePrint Arch. 2016: 708 (2016) - 2015
- [c8]Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3. iNetSeC 2015: 97-111 - [c7]Simona Samardjiska, Danilo Gligoroski:
Approaching maximum embedding efficiency on small covers using Staircase-Generator codes. ISIT 2015: 2752-2756 - [c6]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. Public Key Cryptography 2015: 150-174 - [i6]Simona Samardjiska, Danilo Gligoroski:
Approaching Maximum Embedding Efficiency on Small Covers Using Staircase-Generator Codes. CoRR abs/1508.02284 (2015) - [i5]Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3. IACR Cryptol. ePrint Arch. 2015: 1028 (2015) - 2014
- [c5]Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy:
π-Cipher: Authenticated Encryption for Big Data. NordSec 2014: 110-128 - [i4]Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev:
McEliece in the world of Escher. IACR Cryptol. ePrint Arch. 2014: 360 (2014) - [i3]Simona Samardjiska, Danilo Gligoroski:
Linearity Measures for MQ Cryptography. IACR Cryptol. ePrint Arch. 2014: 703 (2014) - [i2]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. IACR Cryptol. ePrint Arch. 2014: 811 (2014) - 2012
- [c4]Simona Samardjiska, Danilo Gligoroski:
Towards a Secure Multivariate Identity-Based Encryption. ICT Innovations 2012: 59-69 - [c3]Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski:
On the Strong and Weak Keys in MQQ-SIG. ICT Innovations 2012: 183-193 - [i1]Danilo Gligoroski, Simona Samardjiska:
The Multivariate Probabilistic Encryption Scheme MQQ-ENC. IACR Cryptol. ePrint Arch. 2012: 328 (2012) - 2011
- [c2]Simona Samardjiska, Yanling Chen, Danilo Gligoroski:
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields. IAS 2011: 314-319 - 2010
- [c1]Simona Samardjiska:
On Some Cryptographic Properties of the Polynomial Quasigroups. ICT Innovations 2010: 51-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint