Follow
Hristina Mihajloska Trpcheska
Hristina Mihajloska Trpcheska
Ss. Cyril and Methodius University, Faculty of Computer Science and Engineering
Verified email at finki.ukim.mk
Title
Cited by
Cited by
Year
Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4
H Mihajloska, D Gligoroski
The Sixth International Conference on Emerging Security Information, Systems …, 2012
282012
π-cipher v2. 0
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
Cryptographic competitions: CAESAR, 2014
222014
π-Cipher: Authenticated Encryption for Big Data
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, RE Jensen, ...
Secure IT Systems: 19th Nordic Conference, NordSec 2014, Tromsĝ, Norway …, 2014
202014
A Survey on Authenticated Encryption--ASIC Designer’s Perspective
EB Kavun, H Mihajloska, T Yalcin
ACM Computing Surveys (CSUR) 50 (6), 1-21, 2017
182017
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3
H Mihajloska, D Gligoroski, S Samardjiska
132016
A non-linear/linear instruction set extension for lightweight ciphers
S Engels, EB Kavun, C Paar, T Yalçin, H Mihajloska
2013 IEEE 21st Symposium on Computer Arithmetic, 67-75, 2013
122013
GAGE and InGAGE V1. 03
D Gligoroski, H Mihajloska, D Otte, M El-Hadedy
NIST lightweight competition round 1, 114, 2019
112019
Deep learning-based cryptanalysis of different AES modes of operation
MG Perusheska, H Mihajloska Trpceska, V Dimitrova
Future of Information and Communication Conference, 2022
92022
π-cipher v1. Cryptographic competitions: CAESAR (2014)
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
URL http://competitions. cr. yp. to/round1/picipherv2. pdf, 0
8
A Comparative Analysis of HOTP and TOTP Authentication Algorithms. Which one to choose?
J Dobreva, L Lumburovska, HM Trpcheska, V Dimitrova
Security & Future, 2021
62021
A 16-Bit Reconfigurable Encryption Processor for p-Cipher
M El-Hadedy, H Mihajloska, D Gligoroski, A Kulkarni, D Stroobandt, ...
2016 IEEE International Parallel and Distributed Processing Symposium …, 2016
62016
How lightweight is the hardware Implementation of Quasigroup S-boxes
H Mihajloska, T Yalcin, D Gligoroski
ICT Innovations 2012: Secure and Intelligent Systems, 121-128, 2013
62013
A New Approach into Constricting S-Boxes for Lightweight Block Ciphers
H Mihajloska
Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss …, 2011
62011
π-Cipher v2. 0. Submission to the CAESAR competition (2014)
D Gligoroski, H Mihajloska, S Samardjiska, H Jacobsen, M El-Hadedy, ...
6
Programmable processing element for crypto-systems on FPGAs
H Mihajloska Trpcheska, D Gligoroski, M El-Hadedy, K Skadron
Proc. HEART, 2015
52015
Distributed Denial of Wallet Attack on Serverless Pay-as-you-go Model
D Mileski, H Mihajloska
2022 30th Telecommunications Forum (TELFOR), 1-4, 2022
42022
Cryptanalysis of Round-Reduced ASCON powered by ML
D Jankovikj, H MIhajloska Trpcheska, V Dimitrova
Proceedings of the 19th Conference for Informatics and Information Technology, 2022
42022
Classification of Ternary Quasigroups of order 4 Applicable in Cryptography
V Dimitrova, H Mihajloska
Institute of Informatics, Faculty of Natural Sciences and Mathematics, Ss …, 2010
32010
Should MAC’s retain hash properties when the key is known in the next AEAD? Presentation at DIAC 2013, 2013
D Gligoroski, H Mihajloska, H Jacobsen
3
RoBERTa for URL Classification: Enhancing Web Security and Content Filtering
J Ilievska, HM Trpcheska, J Dobreva, V Dimitrova, A Popovska-Mitrovikj
2023 31st Telecommunications Forum (TELFOR), 1-4, 2023
22023
The system can't perform the operation now. Try again later.
Articles 1–20