Vesna Dimitrova

Orcid: 0000-0003-4393-5589

Affiliations:
  • Ss. Cyril and Methodius University in Skopje, Macedonia


According to our database1, Vesna Dimitrova authored at least 21 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing AI Systems: A Comprehensive Overview of Cryptographic Techniques for Enhanced Confidentiality and Integrity.
Proceedings of the 13th Mediterranean Conference on Embedded Computing, 2024

2022
Information Hiding in the DICOM Message Service and Upper Layer Service with Entropy-Based Detection.
Entropy, 2022

StegIm: Image in Image Steganography.
Proceedings of the ICT Innovations 2022. Reshaping the Future Towards a New Normal, 2022

StegYou: Model for Hiding, Retrieving and Detecting Digital Data in Images.
Proceedings of the Future Technologies Conference, 2022

2021
Block Cipher Defined by Matrix Presentation of Quasigroups.
IACR Cryptol. ePrint Arch., 2021

Application of Machine Learning in Cryptanalysis Concerning Algorithms from Symmetric Cryptography.
Proceedings of the Intelligent Computing, 2021

MalDeWe: New Malware Website Detector Model based on Natural Language Processing using Balanced Dataset.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Risks and Opportunities for Information Hiding in DICOM Standard.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2019
Gaussian channel transmission of images and audio files using cryptcoding.
IET Commun., 2019

2017
Representation of Algebraic Structures by Boolean Functions and Its Applications.
Proceedings of the ICT Innovations 2017, 2017

2015
Analysis of the Authenticated Cipher MORUS (v1).
Proceedings of the Cryptography and Information Security in the Balkans, 2015

Network Security Challenges in Android Applications.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers.
IACR Cryptol. ePrint Arch., 2014

Resistance of Statistical Attacks of Parastrophic Quasigroup Transformation.
CoRR, 2014

Pseudo Random Sequence Generators Based on the Parastrophic Quasigroup Transformation.
Proceedings of the ICT Innovations 2014, 2014

2013
Analyzing the Cryptographic Properties of the Sets of Parastrophic Quasigroups of Order 4.
Proceedings of the ICT Innovations 2013, 2013

2012
Cryptographic Properties of Parastrophic Quasigroup Transformation.
Proceedings of the ICT Innovations 2012, 2012

2010
Some Probabilistic Properties of Quasigroup Processed Strings Useful for Cryptanalysis.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010

2009
On a Conditional Collision Attack on NaSHA-512.
IACR Cryptol. ePrint Arch., 2009

Quasigroups as Boolean Functions, Their Equation Systems and Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009


  Loading...