Simona Samardjiska

According to our database1, Simona Samardjiska authored at least 34 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Reducing Signature Size of Matrix-Code-Based Signature Schemes.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

Practical Key-Recovery Attack on MQ-Sign and More.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

Rare Structures in Tensor Graphs - Bermuda Triangles for Cryptosystems Based on the Tensor Isomorphism Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors.
IACR Cryptol. ePrint Arch., 2023

Practical key-recovery attack on MQ-Sign.
IACR Cryptol. ePrint Arch., 2023

Separating Oil and Vinegar with a Single Trace.
IACR Cryptol. ePrint Arch., 2023

Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem.
Proceedings of the Code-Based Cryptography - 11th International Workshop, 2023

Take Your MEDS: Digital Signatures from Matrix Code Equivalence.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023

2022
Practical Multi-Party Private Set Intersection Protocols.
IEEE Trans. Inf. Forensics Secur., 2022

Hardness estimates of the Code Equivalence Problem in the Rank Metric.
IACR Cryptol. ePrint Arch., 2022

2021
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.
IACR Cryptol. ePrint Arch., 2021

Practically Solving LPN.
Proceedings of the IEEE International Symposium on Information Theory, 2021

2020
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Side Channel Information Set Decoding.
IACR Cryptol. ePrint Arch., 2019

A Reaction Attack Against Cryptosystems Based on LRPC Codes.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
SOFIA: <i>MQ</i> MQ -Based Signatures in the QROM.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
SOFIA: MQ-based signatures in the QROM.
IACR Cryptol. ePrint Arch., 2017

2016
From 5-pass MQ-based identification to MQ-based signatures.
IACR Cryptol. ePrint Arch., 2016

A Digital Signature Scheme Based on Random Split of St-Gen Codes.
IACR Cryptol. ePrint Arch., 2016

An encryption scheme based on Random Split of St-Gen codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Semantic Security and Key-Privacy with Random Split of St-Gen Codes.
Proceedings of the Pursuit of the Universal - 12th Conference on Computability in Europe, 2016

From 5-Pass <i>MQ</i> -Based Identification to <i>MQ</i> -Based Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Approaching maximum embedding efficiency on small covers using Staircase-Generator codes.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3.
Proceedings of the Open Problems in Network Security - IFIP WG 11.4 International Workshop, 2015

2014
Linearity Measures for MQ Cryptography.
IACR Cryptol. ePrint Arch., 2014

McEliece in the world of Escher.
IACR Cryptol. ePrint Arch., 2014

π-Cipher: Authenticated Encryption for Big Data.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

2012
The Multivariate Probabilistic Encryption Scheme MQQ-ENC.
IACR Cryptol. ePrint Arch., 2012

Towards a Secure Multivariate Identity-Based Encryption.
Proceedings of the ICT Innovations 2012, 2012

On the Strong and Weak Keys in MQQ-SIG.
Proceedings of the ICT Innovations 2012, 2012

2011
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
On Some Cryptographic Properties of the Polynomial Quasigroups.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010


  Loading...