![]() |
Monika TrimoskaI am an assistant professor at the Coding Theory and Cryptology group at Eindhoven University of Technology (TU/e), led by Tanja Lange. Previously, I was a postdoc in the Digital Security group at Radboud University, working with Simona Samardjiska and Peter Schwabe. I did my PhD in MIS Laboratory at the University of Picardie Jules Verne, under the supervision of Gilles Dequen and Sorina Ionica. After my thesis, I was a Teaching and Research Assistant (ATER) at the University of Picardie Jules Verne. Currently, my primary research interest is cryptanalysis of post-quantum cryptosystems, specifically multivariate, code-based and isogeny-based. During my thesis, I was investigating the use of SAT solvers in cryptographic attacks on public-key cryptosystems, with a focus on elliptic curve cryptography. |
Research interests tags
multivariatecode-basedisogeniesECCalg. cryptanalysisSATsignaturesfault injection
Contact | ![]() |
Research | ![]() |
Publications | ![]() |
Theses
Combinatorics in Algebraic and Logical Cryptanalysis
ECC
alg. cryptanalysis
SAT
PhD thesis
supervised by Sorina Ionica and Gilles Dequen
defended on 14th January 2021
[manuscript][slides][video]
Journal papers
Time-Memory Analysis for Parallel Collision Search Algorithms
ECC
with Sorina Ionica and Gilles Dequen
TCHES, Volume 2021, Issue 2
[link][slides][video]
Book chapters
HappyKidz: Privacy Preserving Phone Usage Tracking
homomorphic encryption
with Benjamin M. Case and Marcella Hastings and Siam Hussain
Protecting Privacy through Homomorphic Encryption
[link]
International Conferences
Take your MEDS: Digital Signatures from Matrix Code Equivalence
code-based
signatures
alg. cryptanalysis
with Tung Chou, Ruben Niederhagen, Edoardo Persichetti, Tovohery Hajatiana Randrianarisoa, Krijn Reijnders and Simona Samardjiska
Africacrypt 2023
[author's version]
Disorientation faults in CSIDH
isogenies
fault injection
with Gustavo Banegas, Juliane Krämer, Tanja Lange, Michael Meyer, Lorenz Panny, Krijn Reijnders and Jana Sotáková
Eurocrypt 2023
[author's version]
Parallel Isogeny Path Finding with Limited Memory
isogenies
with Emanuele Bellini, Jorge Chavez-Saab, Jesús-Javier Chi-Domínguez, Andre Esser, Sorina Ionica, Luis Rivera-Zamarripa, Francisco Rodríguez-Henríquez and Floyd Zweydinger
Indocrypt 2022
[author's version]
Hardness estimates of the Code Equivalence Problem in the Rank Metric
code-based
multivariate
alg. cryptanalysis
with Krijn Reijnders and Simona Samardjiska
WCC 2022 (extended abstract)
[author's extended version]
A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over $\mathbb{F}_2$
alg. cryptanalysis
with Charles Bouillaguet and Claire Delaplace
SOSA 2022
[author's version][implementation by C. Bouillaguet]
Logical cryptanalysis with WDSat
SAT
alg. cryptanalysis
with Gilles Dequen and Sorina Ionica
SAT 2021
[author's version][slides][video]
Parity (XOR) Reasoning for the Index Calculus Attack
SAT
alg. cryptanalysis
ECC
with Sorina Ionica and Gilles Dequen
CP 2020
[author's version][slides][video]
A SAT - Based Approach for Index Calculus on Binary Elliptic Curves
SAT
alg. cryptanalysis
ECC
with Sorina Ionica and Gilles Dequen
Africacrypt 2020
[author's version][slides]
Preprints
Practical key-recovery attack on MQ-Sign
multivariate
signatures
alg. cryptanalysis
with Thomas Aulbach and Simona Samardjiska
[link][implementation]
Artifacts
Parallel Collision Search implementation
ECC
with Sorina Ionica and Gilles Dequen
TCHES 2021
[link]
Talks | ![]() |
Design and cryptanalysis of post-quantum digital signature schemes, at Ciclo de conferencias de la Mujer en la Ciencia [slides][event]


Take your MEDS: Digital Signatures from Matrix Code Equivalence, at the 14th International Conference on Cryptology AFRICACRYPT 2023 [slides]


Setting the Stage: Isogeny-Based Cryptography, at the SIAM Conference on Applied Algebraic Geometry (AG23) [slides]


Algebraic Attack on the Alternating Trilinear Form Equivalence Problem, at the 4th International Workshop on Code-Based Cryptography [slides]


CWG meetings
Disorientation faults in CSIDH, at Crypto Working Group meetings [slides]
17 March 2023
Utrecht, The Netherlands
MIS Seminar
The Matrix Code Equivalence Problem and Applications, at Séminaire de Laboratoire MIS [slides]
24 November 2022
Amiens, France
CSNG 2022
Digital Signatures from the Matrix-code Equivalence problem, at the 8th Annual Cyber Security Next Generation Workshop [slides]
13 October 2022
Delft, The Netherlands
CrossFyre 2022
Disorientation faults in CSIDH, at the 11th International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers [slides]
6 October 2022
Passau, Germany
Virtual Summer School
The Matrix Code Equivalence Problem and Applications, at the Contemporary algebraic and geometric techniques in coding theory and cryptography [abstract][slides]
21 July 2022
online (Università degli Studi della Campania Luigi Vanvitelli)
CrossFyre 2021
A Simple Deterministic Algorithm for Systems of Quadratic Polynomials over $\mathbb{F}_2$, at the 10th International Workshop on Cryptography, Robustness, and Provably Secure Schemes for Female Young Researchers [slides]
2 December 2021
online
CHES 2021
Time-Memory Analysis for Parallel Collision Search Algorithms, at the annual Conference on Cryptographic Hardware and Embedded Systems [slides][pre-recording][live session]
13 September 2021
online
Logical cryptanalysis with WDSat, at the 24th International Conference on Theory and Applications of Satisfiability Testing [slides]


AGC2T
A SAT-based approach for index calculus on binary elliptic curves, at the Arithmetic, Geometry, Cryptography and Coding Theory Conference [slides][video]
1 June 2021
online (CIRM, Marseille Luminy, France)
Caramba Seminar
Cryptanalyse logique du problème du logarithme discret sur courbes elliptiques, at Séminaire de l'équipe Caramba (Inria Nancy) [slides]
12 March 2021
online (INRIA Nancy)
ATI Seminar
Calcul d'index pour des courbes elliptiques définies sur des extensions de corps finis, at Séminaire Arithmétique et Théorie de l’Information [slides]
18 February 2021
online (Université Aix-Maseille)
CP 2020
Parity (XOR) Reasoning for the Index Calculus Attack, at the 26th International Conference on Principles and Practice of Constraint Programming [slides][video]
9 September 2020
online (Louvain-la-Neuve, Belgium)
IMACC 2019
A SAT-based approach for index calculus on binary elliptic curves, at the 17th IMA International Conference on Cryptography and Coding [slides]
17 December 2019
St Anne’s College, University of Oxford, Oxford, UK
MSR Seminar
A SAT-based approach for index calculus on binary elliptic curves, at a seminar at the Microsoft Reasearch Lab [slides]
5 December 2019
Microsoft Research, Redmond, Washington, USA
Private AI Bootcamp
HappyKidz: Privacy Preserving Phone Usage Tracking, at Private AI Bootcamp Competition 2019 [video]
4 December 2019
Microsoft, Redmond, Washington, USA
JJCMIS 2019
Analyse de la difficulté des Cryptosystèmes à l’Aide du Problème du Transversal Minimum, at Journée des Jeunes Chercheurs du MIS 2019 [slides]
5 July 2019
Amiens, France
GT BAC
A SAT-based approach for index calculus on binary elliptic curves, at Groupe de Travail "Butte aux Cailles" [slides]
16 May 2019
l'ENST (Télécom ParisTech), Paris, France
JC2 2018
Time-Memory Trade-offs for Parallel Collision Search Algorithms, at Journées Codage & Cryptographie 2018 [slides]
11 October 2018
Centre Paul-Langevin – CAES du CNRS, Aussois, France
JJCMIS 2018
Cryptanalyse logique du problème du logarithme discret, at Journée des Jeunes Chercheurs du MIS 2018 [slides]
29 May 2018
Amiens, France
JRES 2017
A propos d'un schéma d'authentification OTP, at Journées Réseaux de l’Enseignement et de la Recherche 2017 [video]
15 November 2017
Nantes, France
JJCMIS 2017
Protocole d’authentification CrypTonAuth, at Journée des Jeunes Chercheurs du MIS 2017 [slides]
30 May 2017
Amiens, France
Other outreach materials
Alice & Eve 2021 Poster [event]
Diffie-Hellman key exchange with colors
Presented at a laboratory visit for students who have participated in the Alkindi cryptography competition.
Time-Memory Trade-offs for PCS Algorithms - poster in French
Le protocole d’authentification CrypTonAuth
Newsletter of MIS Laboratory, September 2017
Software | ![]() |
MCE
Implementations of algorithms for solving the Matrix Code Equivalence problem (MCE).
[github]
WDSat
A SAT solver dedicated to solving instances derived from a Weil descent.
[github]
PCS - Published as TCHES 2021 Artifact
Implementation of a Parallel Collision Search algorithm for solving the ECDLP.
[github]
Weil descent
A Weil descent implementation for binary elliptic curves over prime-degree extension fields.
[github]
CrypTonAuth
A C library for implementing the CrypTonAuth authentication method, prepared for ANSSI standardisation.
[proprietary]
CrypTonID
A C library for implementing the CrypTonID technology, prepared for ANSSI standardisation.
[proprietary]
Prizes and distinctions | ![]() |
I was part of the winning team of the Private AI Bootcamp organised by Microsoft Research (December 2019, Seattle, US).
Teaching | ![]() |
Courses | ![]() |
Cryptology
Master's course - invited lecture [Cryptanalysis in elliptic curve cryptography], assignments.
Object-oriented programming 2 and Reactive programming
Third year - lectures, tutorials and laboratory work (cours, TD, TP).
Advanced algorithms
Second year - tutorials and laboratory work (TD, TP).
C programming
Second year - laboratory work (TP).
Elements of formal logic and mathematical reasoning
First year - tutorials (TD).
Algorithms and programming
First year - tutorials and laboratory work (TD, TP).
Propositional logic
First year - tutorials and laboratory work (TD, TP).
Introduction to databases
First year - tutorials and laboratory work (TD, TP).
Introduction to programming
First year - tutorials and laboratory work (TD, TP).
Internet and web
First year - tutorials and laboratory work (TD, TP).
Mentoring | ![]() |
I am currently a daily supervisor of a Bachelor's thesis on the topic of assesing the diffuclty of the QMLE problem over $\mathbb{F}_2$, co-supervised with Simona Samardjiska.
Master's Thesis
I acted as second reader of the Master thesis of Marta Parada Segui, titled Elliptic curves: various models and their addition laws, supervised by Wieb Bosma.
Master's Internship
I co-supervised, with Sorina Ionica, a student in their second year of Master's studies on the topic of computing multiple elliptic curve discrete logarithms using the Parallel collision search algorithm by van Oorschot and Wiener.
Undergraduate internship
I co-supervised, with Gilles Dequen, a student in their third year of Undergraduate studies in CS. The student was working on a commercial presentation (website, explanatory animations) of the CrypTonAuth authentication technology and on storage solutions.
Miscellaneous | ![]() |
- AAC 2024
- ESORICS 2023 posters
- ACNS 2024
- ISC 2023
- CHES 2023 Artifact Review
- CHES 2022 Artifact Review
- ACISP 2023
- Journal of Cryptographic Engineering
- IEEE TIFS
- PKC 2023
- CT-RSA 2023
- Asiacrypt 2022
- Crypto 2022
- WCC 2022
- Journal of Cybersecurity
- Latincrypt 2021
- SAT 2021
- Crypto 2019
- 2nd Oxford Post-Quantum Cryptography Workshop 2023 (with Ali El Kaafarani, Federico Pintore, Thomas Prest, Simona Samardjiska and Peter Schwabe)
- Best Cybersecurity Master Thesis (BCMT) Award in the Netherlands 2023 (with Balakrishnan Chandrasekaran)
- Minisymposium Applications of Isogenies in Cryptography at SIAM AG23 Conference (with Tanja Lange and Krijn Reijnders)
- Summer School on real-world crypto and privacy 2023 (with Lejla Batina, Silvia Mella, Stjepan Picek and Simona Samardjiska)
- Journée des Jeunes Chercheurs du MIS 2019 (with Viet Long Bui Tuan and Eder Alejandro Rodríguez-Martínez)
- Summer School on real-world crypto and privacy 2022
- RWC 2022
- Eurocrypt 2021
- JFPC/JIAF 2018 (National Constraint Programming Days in France / National Artificial Intelligence Days in France)
- University of Picardie Jules Verne - elected student member from April 2018 to March 2020
- I animated, with Sorina Ionica, a laboratory visit for primary school students who have participated in the Alkindi cryptography competition.
Other interests | ![]() |
Icon credit (CC)