H
Hristina Mihajloska
Researcher at Saints Cyril and Methodius University of Skopje
Publications - 13
Citations - 68
Hristina Mihajloska is an academic researcher from Saints Cyril and Methodius University of Skopje. The author has contributed to research in topics: Authenticated encryption & Cryptography. The author has an hindex of 4, co-authored 11 publications receiving 49 citations.
Papers
More filters
Proceedings Article
Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4
TL;DR: This methodology enables someone to work basically with several different strong S-boxes iteratively reusing only one hardware circuit and just changing a few parameters (called leaders in the authors' method).
Book ChapterDOI
π-Cipher: Authenticated Encryption for Big Data
Danilo Gligoroski,Hristina Mihajloska,Simona Samardjiska,Håkon Jacobsen,Rune Erlend Jensen,Mohamed El-Hadedy +5 more
TL;DR: π-Cipher is parallel, incremental, nonce based authenticated encryption cipher with associated data designed with the special purpose of providing confidentiality and integrity for big data in transit or at rest.
Proceedings ArticleDOI
A Non-Linear/Linear Instruction Set Extension for Lightweight Ciphers
TL;DR: This work tries to address the open question of efficient cipher implementations on small CPUs by introducing a non-linear/linear instruction set extension, to which it is referred to as NLU, capable of implementing on-linear operations expressed in their algebraic normal form (ANF) and linear operations express in binary "matrix multiply-and-add" form.
Journal ArticleDOI
A Survey on Authenticated Encryption--ASIC Designer’s Perspective
TL;DR: This work presents a comprehensive survey of hardware performance of the most commonly used AE schemes in the literature, and reveals 13%--30% performance boost in permutation-based AE compared to conventional schemes, and can be used as a benchmark in the ongoing AE competition CAESAR.
Book ChapterDOI
Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3
TL;DR: In this article, the authors proposed two incremental hash functions, iSHAKE128 and i SHAKE256, based on the recent NIST proposal for SHA-3 Extendable-Output Functions SHAKE 128 and SHAKE 256.