


Остановите войну!
for scientists:
Simona Samardjiska
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j2]Aslí Bay
, Zekeriya Erkin
, Jaap-Henk Hoepman, Simona Samardjiska, Jelle Vos
:
Practical Multi-Party Private Set Intersection Protocols. IEEE Trans. Inf. Forensics Secur. 17: 1-15 (2022) - [i16]Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Hardness estimates of the Code Equivalence Problem in the Rank Metric. IACR Cryptol. ePrint Arch. 2022: 276 (2022) - 2021
- [j1]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 88-113 (2021) - [c15]Thom Wiggers
, Simona Samardjiska:
Practically Solving LPN. ISIT 2021: 2399-2404 - [i15]Mike Hamburg, Julius Hermelink, Robert Primas, Simona Samardjiska, Thomas Schamberger, Silvan Streit, Emanuele Strieder, Christine van Vredendaal:
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber. IACR Cryptol. ePrint Arch. 2021: 956 (2021) - [i14]Thom Wiggers, Simona Samardjiska:
Practically Solving LPN. IACR Cryptol. ePrint Arch. 2021: 962 (2021) - 2020
- [c14]Norman Lahr, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation. ASIACRYPT (1) 2020: 881-910
2010 – 2019
- 2019
- [c13]Simona Samardjiska, Paolo Santini
, Edoardo Persichetti, Gustavo Banegas:
A Reaction Attack Against Cryptosystems Based on LRPC Codes. LATINCRYPT 2019: 197-216 - [i13]Simona Samardjiska, Paolo Santini, Edoardo Persichetti, Gustavo Banegas:
A Reaction Attack against Cryptosystems based on LRPC Codes. IACR Cryptol. ePrint Arch. 2019: 845 (2019) - [i12]Norman Lahr
, Ruben Niederhagen, Richard Petri, Simona Samardjiska:
Side Channel Information Set Decoding. IACR Cryptol. ePrint Arch. 2019: 1459 (2019) - 2018
- [c12]Ming-Shing Chen, Andreas Hülsing
, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
SOFIA: MQ MQ -Based Signatures in the QROM. Public Key Cryptography (2) 2018: 3-33 - 2017
- [i11]Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
SOFIA: MQ-based signatures in the QROM. IACR Cryptol. ePrint Arch. 2017: 680 (2017) - 2016
- [c11]Ming-Shing Chen, Andreas Hülsing
, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
From 5-Pass MQ -Based Identification to MQ -Based Signatures. ASIACRYPT (2) 2016: 135-165 - [c10]Danilo Gligoroski, Simona Samardjiska:
Semantic Security and Key-Privacy with Random Split of St-Gen Codes. CiE 2016: 105-114 - [c9]Simona Samardjiska, Danilo Gligoroski:
An encryption scheme based on Random Split of St-Gen codes. ISIT 2016: 800-804 - [i10]Simona Samardjiska, Danilo Gligoroski:
An Encryption Scheme based on Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 202 (2016) - [i9]Danilo Gligoroski, Simona Samardjiska:
Semantic Security and Key-Privacy With Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 218 (2016) - [i8]Danilo Gligoroski, Simona Samardjiska:
A Digital Signature Scheme Based on Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 391 (2016) - [i7]Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe:
From 5-pass MQ-based identification to MQ-based signatures. IACR Cryptol. ePrint Arch. 2016: 708 (2016) - 2015
- [c8]Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3. iNetSeC 2015: 97-111 - [c7]Simona Samardjiska, Danilo Gligoroski:
Approaching maximum embedding efficiency on small covers using Staircase-Generator codes. ISIT 2015: 2752-2756 - [c6]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. Public Key Cryptography 2015: 150-174 - [i6]Simona Samardjiska, Danilo Gligoroski:
Approaching Maximum Embedding Efficiency on Small Covers Using Staircase-Generator Codes. CoRR abs/1508.02284 (2015) - [i5]Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3. IACR Cryptol. ePrint Arch. 2015: 1028 (2015) - 2014
- [c5]Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy:
π-Cipher: Authenticated Encryption for Big Data. NordSec 2014: 110-128 - [i4]Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev:
McEliece in the world of Escher. IACR Cryptol. ePrint Arch. 2014: 360 (2014) - [i3]Simona Samardjiska, Danilo Gligoroski:
Linearity Measures for MQ Cryptography. IACR Cryptol. ePrint Arch. 2014: 703 (2014) - [i2]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. IACR Cryptol. ePrint Arch. 2014: 811 (2014) - 2012
- [c4]Simona Samardjiska, Danilo Gligoroski:
Towards a Secure Multivariate Identity-Based Encryption. ICT Innovations 2012: 59-69 - [c3]Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski:
On the Strong and Weak Keys in MQQ-SIG. ICT Innovations 2012: 183-193 - [i1]Danilo Gligoroski, Simona Samardjiska:
The Multivariate Probabilistic Encryption Scheme MQQ-ENC. IACR Cryptol. ePrint Arch. 2012: 328 (2012) - 2011
- [c2]Simona Samardjiska, Yanling Chen, Danilo Gligoroski:
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields. IAS 2011: 314-319 - 2010
- [c1]Simona Samardjiska:
On Some Cryptographic Properties of the Polynomial Quasigroups. ICT Innovations 2010: 51-60
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-06-25 02:40 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint