Simona Samardjiska

According to our database1, Simona Samardjiska authored at least 31 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hardness estimates of the code equivalence problem in the rank metric.
Des. Codes Cryptogr., March, 2024

Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem.
IACR Cryptol. ePrint Arch., 2024

2023
Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Separating Oil and Vinegar with a Single Trace Side-Channel Assisted Kipnis-Shamir Attack on UOV.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Practical key-recovery attack on MQ-Sign.
IACR Cryptol. ePrint Arch., 2023

Separating Oil and Vinegar with a Single Trace.
IACR Cryptol. ePrint Arch., 2023

2022
Practical Multi-Party Private Set Intersection Protocols.
IEEE Trans. Inf. Forensics Secur., 2022

Take your MEDS: Digital Signatures from Matrix Code Equivalence.
IACR Cryptol. ePrint Arch., 2022

2021
Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Practically Solving LPN.
IACR Cryptol. ePrint Arch., 2021

2020
Side Channel Information Set Decoding Using Iterative Chunking - Plaintext Recovery from the "Classic McEliece" Hardware Reference Implementation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
A Reaction Attack against Cryptosystems based on LRPC Codes.
IACR Cryptol. ePrint Arch., 2019

Side Channel Information Set Decoding.
IACR Cryptol. ePrint Arch., 2019

2018
SOFIA: <i>MQ</i> MQ -Based Signatures in the QROM.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
SOFIA: MQ-based signatures in the QROM.
IACR Cryptol. ePrint Arch., 2017

2016
An Encryption Scheme based on Random Split of St-Gen Codes.
IACR Cryptol. ePrint Arch., 2016

From 5-pass MQ-based identification to MQ-based signatures.
IACR Cryptol. ePrint Arch., 2016

A Digital Signature Scheme Based on Random Split of St-Gen Codes.
IACR Cryptol. ePrint Arch., 2016

Semantic Security and Key-Privacy With Random Split of St-Gen Codes.
IACR Cryptol. ePrint Arch., 2016

From 5-Pass <i>MQ</i> -Based Identification to <i>MQ</i> -Based Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3.
IACR Cryptol. ePrint Arch., 2015

Approaching maximum embedding efficiency on small covers using Staircase-Generator codes.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
Linearity Measures for MQ Cryptography.
IACR Cryptol. ePrint Arch., 2014

McEliece in the world of Escher.
IACR Cryptol. ePrint Arch., 2014

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
IACR Cryptol. ePrint Arch., 2014

π-Cipher: Authenticated Encryption for Big Data.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

2012
The Multivariate Probabilistic Encryption Scheme MQQ-ENC.
IACR Cryptol. ePrint Arch., 2012

Towards a Secure Multivariate Identity-Based Encryption.
Proceedings of the ICT Innovations 2012, 2012

On the Strong and Weak Keys in MQQ-SIG.
Proceedings of the ICT Innovations 2012, 2012

2011
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
On Some Cryptographic Properties of the Polynomial Quasigroups.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010


  Loading...