Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4 H Mihajloska, D Gligoroski The Sixth International Conference on Emerging Security Information, Systems …, 2012 | 28 | 2012 |
π-cipher v2. 0 D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ... Cryptographic competitions: CAESAR, 2014 | 22 | 2014 |
π-Cipher: Authenticated Encryption for Big Data D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ... Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsø, Norway …, 2014 | 20 | 2014 |
A Survey on Authenticated Encryption--ASIC Designer’s Perspective EB Kavun, H Mihajloska, T Yalcin ACM Computing Surveys (CSUR) 50 (6), 1-21, 2017 | 18 | 2017 |
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 H Mihajloska, D Gligoroski, S Samardjiska | 13 | 2016 |
GAGE and InGAGE V1. 03 D Gligoroski, H Mihajloska, D Otte, M El-Hadedy NIST lightweight competition round 1, 114, 2019 | 11 | 2019 |
A non-linear/linear instruction set extension for lightweight ciphers S Engels, EB Kavun, C Paar, T Yalçin, H Mihajloska 2013 IEEE 21st Symposium on Computer Arithmetic, 67-75, 2013 | 11 | 2013 |
π-cipher v1. Cryptographic competitions: CAESAR (2014) D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ... URL http://competitions. cr. yp. to/round1/picipherv2. pdf, 0 | 8 | |
A 16-Bit Reconfigurable Encryption Processor for p-Cipher M El-Hadedy, H Mihajloska, D Gligoroski, A Kulkarni, D Stroobandt, ... 2016 IEEE International Parallel and Distributed Processing Symposium …, 2016 | 6 | 2016 |
How lightweight is the hardware Implementation of Quasigroup S-boxes H Mihajloska, T Yalcin, D Gligoroski ICT Innovations 2012: Secure and Intelligent Systems, 121-128, 2013 | 6 | 2013 |
A New Approach into Constricting S-Boxes for Lightweight Block Ciphers H Mihajloska Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss …, 2011 | 6 | 2011 |
π-Cipher v2. 0. Submission to the CAESAR competition (2014) D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ... | 6 | |
Programmable processing element for crypto-systems on FPGAs M El-Hadedy, K Skadron, H Mihajloska, D Gligoroski Proc. HEART 535, 2015 | 5* | 2015 |
Distributed Denial of Wallet Attack on Serverless Pay-as-you-go Model D Mileski, H Mihajloska 2022 30th Telecommunications Forum (TELFOR), 1-4, 2022 | 4 | 2022 |
Cryptanalysis of Round-Reduced ASCON powered by ML D Jankovikj, H MIhajloska Trpcheska, V Dimitrova Proceedings of the 19th Conference for Informatics and Information Technology, 2022 | 4 | 2022 |
Classification of Ternary Quasigroups of order 4 Applicable in Cryptography V Dimitrova, H Mihajloska Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss …, 2010 | 3 | 2010 |
Should MAC’s retain hash properties when the key is known in the next AEAD? Presentation at DIAC 2013, 2013 D Gligoroski, H Mihajloska, H Jacobsen | 3 | |
π-Cipher with Intermediate Tags H Mihajloska, B Mennink, D Gligoroski Accessed: Jan 9, 2021, 2016 | 2 | 2016 |
Lightweight version of π-Cipher H Mihajloska, M El Hadedy, D Gligoroski, K Skadron NIST Lightweight Cryptography Workshop, 2015 | 2 | 2015 |
Detecting Malware in Android Applications using XGBoost A Kitanovski, H Mihajloska Trpcheska, V Dimitrova Ss Cyril and Methodius University in Skopje, Faculty of Computer Science and …, 2023 | 1 | 2023 |