Follow
Hristina Mihajloska
Hristina Mihajloska
Ss. Cyril and Methodius University, Faculty of Computer Science and Engineering
Verified email at finki.ukim.mk
Title
Cited by
Cited by
Year
Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4
H Mihajloska, D Gligoroski
The Sixth International Conference on Emerging Security Information, Systems …, 2012
272012
ð-cipher v2. 0
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
222014
ð-Cipher: Authenticated Encryption for Big Data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014
202014
A Survey on Authenticated Encryption--ASIC Designer¢s Perspective
EB Kavun, H Mihajloska, T Yalcin
ACM Computing Surveys (CSUR) 50 (6), 1-21, 2017
182017
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3
H Mihajloska, D Gligoroski, S Samardjiska
132016
GAGE and InGAGE V1. 03
D Gligoroski, H Mihajloska, D Otte, M El-Hadedy
NIST lightweight competition round 1, 114, 2019
112019
A non-linear/linear instruction set extension for lightweight ciphers
S Engels, EB Kavun, C Paar, T Yalçin, H Mihajloska
2013 IEEE 21st Symposium on Computer Arithmetic, 67-75, 2013
112013
ð-cipher v1. Cryptographic competitions: CAESAR (2014)
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
URL http://competitions. cr. yp. to/round1/picipherv2. pdf, 0
8
A 16-Bit Reconfigurable Encryption Processor for p-Cipher
M El-Hadedy, H Mihajloska, D Gligoroski, A Kulkarni, D Stroobandt, ...
2016 IEEE International Parallel and Distributed Processing Symposium …, 2016
62016
How lightweight is the hardware Implementation of Quasigroup S-boxes
H Mihajloska, T Yalcin, D Gligoroski
ICT Innovations 2012: Secure and Intelligent Systems, 121-128, 2013
62013
A New Approach into Constricting S-Boxes for Lightweight Block Ciphers
H Mihajloska
Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss …, 2011
62011
ð-Cipher v2. 0. Submission to the CAESAR competition (2014)
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
6
Programmable processing element for crypto-systems on FPGAs
M El-Hadedy, K Skadron, H Mihajloska, D Gligoroski
Proc. HEART 535, 2015
5*2015
Distributed Denial of Wallet Attack on Serverless Pay-as-you-go Model
D Mileski, H Mihajloska
2022 30th Telecommunications Forum (TELFOR), 1-4, 2022
42022
Cryptanalysis of Round-Reduced ASCON powered by ML
D Jankovikj, H MIhajloska Trpcheska, V Dimitrova
Proceedings of the 19th Conference for Informatics and Information Technology, 2022
32022
Classification of Ternary Quasigroups of order 4 Applicable in Cryptography
V Dimitrova, H Mihajloska
Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss …, 2010
32010
Should MAC¢s retain hash properties when the key is known in the next AEAD? Presentation at DIAC 2013, 2013
D Gligoroski, H Mihajloska, H Jacobsen
3
ð-Cipher with Intermediate Tags
H Mihajloska, B Mennink, D Gligoroski
Accessed: Jan 9, 2021, 2016
22016
Lightweight version of ð-Cipher
H Mihajloska, M El Hadedy, D Gligoroski, K Skadron
NIST Lightweight Cryptography Workshop, 2015
22015
Detecting Malware in Android Applications using XGBoost
A Kitanovski, H Mihajloska Trpcheska, V Dimitrova
Ss Cyril and Methodius University in Skopje, Faculty of Computer Science and …, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20