default search action
Danilo Gligoroski
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i56]Danilo Gligoroski, Sahana Sridhar, Katina Kralevska:
GRAND Massive Parallel Decoding Framework for Low Latency in Beyond 5G. CoRR abs/2405.01808 (2024) - 2023
- [c63]Håkon I. FrØland, Edward Palm, Katina Kralevska, Danilo Gligoroski:
Web3 and Blockchain for Modernizing the Reseller Market. BCCA 2023: 215-220 - [i55]Danilo Gligoroski:
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2023: 318 (2023) - 2022
- [c62]Mayank Raikwar, Danilo Gligoroski:
SoK: Decentralized Randomness Beacon Protocols. ACISP 2022: 420-446 - [c61]Sondre Kielland, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski:
Secure Service Implementation with Slice Isolation and WireGuard. MeditCom 2022: 148-153 - [i54]Mayank Raikwar, Danilo Gligoroski:
DoS Attacks on Blockchain Ecosystem. CoRR abs/2205.13322 (2022) - [i53]Mayank Raikwar, Danilo Gligoroski:
SoK: Decentralized Randomness Beacon Protocols. CoRR abs/2205.13333 (2022) - [i52]Sondre Kielland, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski:
Secure Service Implementation with Slice Isolation and WireGuard. CoRR abs/2207.12471 (2022) - 2021
- [c60]Kamilla Stevenson, Oda Skoglund, Mayank Raikwar, Danilo Gligoroski:
Efficient Novel Privacy Preserving PoS Protocol Proof-of-concept with Algorand. BIOTC 2021: 44-52 - [c59]Mayank Raikwar, Danilo Gligoroski:
R3V: Robust Round Robin VDF-based Consensus. BRAINS 2021: 81-88 - [c58]Mayank Raikwar, Danilo Gligoroski:
The Meshwork Ledger, its Consensus and Reward Mechanisms. COMSNETS 2021: 290-298 - [c57]Mayank Raikwar, Danilo Gligoroski:
Non-Interactive VDF Client Puzzle for DoS Mitigation. EICC 2021: 32-38 - [c56]Mayank Raikwar, Danilo Gligoroski:
DoS Attacks on Blockchain Ecosystem. Euro-Par Workshops 2021: 230-242 - [c55]Mayank Raikwar, Danilo Gligoroski:
Aggregation in Blockchain Ecosystem. SDS 2021: 1-6 - [i51]Danilo Gligoroski:
Entropoid Based Cryptography. CoRR abs/2104.05598 (2021) - [i50]Danilo Gligoroski:
Entropoid Based Cryptography. IACR Cryptol. ePrint Arch. 2021: 469 (2021) - [i49]Danilo Gligoroski:
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise". IACR Cryptol. ePrint Arch. 2021: 896 (2021) - 2020
- [j11]Anton Hasselgren, Katina Kralevska, Danilo Gligoroski, Sindre A. Pedersen, Arild Faxvaag:
Blockchain in healthcare and health sciences - A scoping review. Int. J. Medical Informatics 134 (2020) - [c54]Mohamed El-Hadedy, Martin Margala, Sergiu Mosanu, Danilo Gligoroski, Jinjun Xiong, Wen-Mei Hwu:
Micro - GAGE: A Low-power Compact GAGE Hash Function Processor for IoT Applications. ICECS 2020: 1-4 - [c53]Jens-Andreas Hanssen Rensaa, Danilo Gligoroski, Katina Kralevska, Anton Hasselgren, Arild Faxvaag:
VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept. IECC 2020: 73-80 - [c52]Anton Hasselgren, Katina Kralevska, Danilo Gligoroski, Arild Faxvaag:
GDPR Compliant Blockchain and Distributed Ledger Technologies in the Health Sector. MIE 2020: 1293-1294 - [c51]Ali Esmaeily, Katina Kralevska, Danilo Gligoroski:
A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G. NetSoft 2020: 29-35 - [c50]Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski:
5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept. NFV-SDN 2020: 181-187 - [c49]Mayank Raikwar, Danilo Gligoroski, Goran Velinov:
Trends in Development of Databases and Blockchain. SDS 2020: 177-182 - [i48]Mayank Raikwar, Danilo Gligoroski, Goran Velinov:
Trends in Development of Databases and Blockchain. CoRR abs/2003.05687 (2020) - [i47]Ali Esmaeily, Katina Kralevska, Danilo Gligoroski:
A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G. CoRR abs/2004.10455 (2020) - [i46]Jens-Andreas Hanssen Rensaa, Danilo Gligoroski, Katina Kralevska, Anton Hasselgren, Arild Faxvaag:
VerifyMed - A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept. CoRR abs/2005.08804 (2020) - [i45]Katrine Wist, Malene Helsem, Danilo Gligoroski:
Vulnerability Analysis of 2500 Docker Hub Images. CoRR abs/2006.02932 (2020) - [i44]Anton Hasselgren, Paul Kengfai Wan, Margareth Horn, Katina Kralevska, Danilo Gligoroski, Arild Faxvaag:
GDPR Compliance for Blockchain Applications in Healthcare. CoRR abs/2009.12913 (2020) - [i43]Simen Haga, Ali Esmaeily, Katina Kralevska, Danilo Gligoroski:
5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept. CoRR abs/2010.03849 (2020)
2010 – 2019
- 2019
- [j10]Danilo Gligoroski, Katina Kralevska:
Expanded Combinatorial Designs as Tool to Model Network Slicing in 5G. IEEE Access 7: 54879-54887 (2019) - [j9]Mayank Raikwar, Danilo Gligoroski, Katina Kralevska:
SoK of Used Cryptography in Blockchain. IEEE Access 7: 148550-148575 (2019) - [j8]Danilo Gligoroski, Katina Kralevska, Rune Erlend Jensen, Per Simonsen:
Network traffic driven storage repair. Int. J. Big Data Intell. 6(3/4): 212-223 (2019) - [c48]Mathias Kjolleberg Forland, Katina Kralevska, Michele Garau, Danilo Gligoroski:
Preventing DDoS with SDN in 5G. GLOBECOM Workshops 2019: 1-7 - [i42]Danilo Gligoroski, Katina Kralevska:
Expanded Combinatorial Designs as Tool to Model Network Slicing in 5G. CoRR abs/1904.10412 (2019) - [i41]Mayank Raikwar, Danilo Gligoroski, Katina Kralevska:
SoK of Used Cryptography in Blockchain. CoRR abs/1906.08609 (2019) - [i40]Mayank Raikwar, Danilo Gligoroski, Katina Kralevska:
SoK of Used Cryptography in Blockchain. IACR Cryptol. ePrint Arch. 2019: 735 (2019) - 2018
- [j7]Katina Kralevska, Danilo Gligoroski, Rune Erlend Jensen, Harald Øverby:
HashTag Erasure Codes: From Theory to Practice. IEEE Trans. Big Data 4(4): 516-529 (2018) - [c47]Katina Kralevska, Danilo Gligoroski:
An Explicit Construction of Systematic MDS Codes with Small Sub-Packetization for All-Node Repair. DASC/PiCom/DataCom/CyberSciTech 2018: 1080-1084 - [i39]Danilo Gligoroski, Kristian Gjøsteen, Katina Kralevska:
On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields. CoRR abs/1801.06736 (2018) - [i38]Danilo Gligoroski, Katina Kralevska, Rune Erlend Jensen, Per Simonsen:
Network Traffic Driven Storage Repair. CoRR abs/1803.03682 (2018) - [i37]Katina Kralevska, Danilo Gligoroski:
An Explicit Construction of Systematic MDS Codes with Small Sub-packetization for All-Node Repair. CoRR abs/1806.03103 (2018) - 2017
- [c46]Danilo Gligoroski, Katina Kralevska, Rune Erlend Jensen, Per Simonsen:
Repair Duality with Locally Repairable and Locally Regenerating Codes. DASC/PiCom/DataCom/CyberSciTech 2017: 979-984 - [i36]Danilo Gligoroski, Katina Kralevska, Rune Erlend Jensen, Per Simonsen:
Locally Repairable and Locally Regenerating Codes Obtained by Parity-Splitting of HashTag Codes. CoRR abs/1701.06664 (2017) - 2016
- [j6]Katina Kralevska, Danilo Gligoroski, Harald Øverby:
General Sub-Packetized Access-Optimal Regenerating Codes. IEEE Commun. Lett. 20(7): 1281-1284 (2016) - [c45]Danilo Gligoroski, Simona Samardjiska:
Semantic Security and Key-Privacy with Random Split of St-Gen Codes. CiE 2016: 105-114 - [c44]Mohamed El-Hadedy, Hristina Mihajloska, Danilo Gligoroski, Amit Kulkarni, Dirk Stroobandt, Kevin Skadron:
A 16-Bit Reconfigurable Encryption Processor for p-Cipher. IPDPS Workshops 2016: 162-171 - [c43]Simona Samardjiska, Danilo Gligoroski:
An encryption scheme based on Random Split of St-Gen codes. ISIT 2016: 800-804 - [c42]Katina Kralevska, Danilo Gligoroski, Harald Øverby:
Balanced locally repairable codes. ISTC 2016: 280-284 - [c41]Britta Hale, Christopher Carr, Danilo Gligoroski:
CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control. Mycrypt 2016: 389-408 - [i35]Katina Kralevska, Danilo Gligoroski, Harald Øverby:
Balanced XOR-ed Coding. CoRR abs/1601.06327 (2016) - [i34]Danilo Gligoroski, Katina Kralevska, Harald Øverby:
Minimal Header Overhead for Random Linear Network Coding. CoRR abs/1601.06449 (2016) - [i33]Katina Kralevska, Harald Øverby, Danilo Gligoroski:
Coded Packet Transport for Optical Packet/Burst Switched Networks. CoRR abs/1601.07036 (2016) - [i32]Katina Kralevska, Danilo Gligoroski, Harald Øverby:
General Sub-packetized Access-Optimal Regenerating Codes. CoRR abs/1607.04109 (2016) - [i31]Katina Kralevska, Danilo Gligoroski, Harald Øverby:
Balanced Locally Repairable Codes. CoRR abs/1607.04137 (2016) - [i30]Katina Kralevska, Danilo Gligoroski, Rune Erlend Jensen, Harald Øverby:
HashTag Erasure Codes: From Theory to Practice. CoRR abs/1609.02450 (2016) - [i29]Danilo Gligoroski, Katina Kralevska:
Families of Optimal Binary Non-MDS Erasure Codes. CoRR abs/1609.02460 (2016) - [i28]Simona Samardjiska, Danilo Gligoroski:
An Encryption Scheme based on Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 202 (2016) - [i27]Danilo Gligoroski, Simona Samardjiska:
Semantic Security and Key-Privacy With Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 218 (2016) - [i26]Danilo Gligoroski, Simona Samardjiska:
A Digital Signature Scheme Based on Random Split of St-Gen Codes. IACR Cryptol. ePrint Arch. 2016: 391 (2016) - 2015
- [c40]Dijana Vukovic, Danilo Gligoroski, Zoran Djuric:
CryptoCloak protocol and the prototype application. CNS 2015: 721-722 - [c39]Katina Kralevska, Harald Øverby, Danilo Gligoroski:
Coded Packet Transport for Optical Packet/Burst Switched Networks. GLOBECOM 2015: 1-6 - [c38]Danilo Gligoroski, Katina Kralevska, Harald Øverby:
Minimal header overhead for random linear network coding. ICC Workshops 2015: 680-685 - [c37]Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte Era Use Case: Incremental Hash Functions Based on SHA-3. iNetSeC 2015: 97-111 - [c36]Simona Samardjiska, Danilo Gligoroski:
Approaching maximum embedding efficiency on small covers using Staircase-Generator codes. ISIT 2015: 2752-2756 - [c35]Natasa Ilievska, Danilo Gligoroski:
Simulation of a quasigroup error-detecting linear code. MIPRO 2015: 436-441 - [c34]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. Public Key Cryptography 2015: 150-174 - [i25]Simona Samardjiska, Danilo Gligoroski:
Approaching Maximum Embedding Efficiency on Small Covers Using Staircase-Generator Codes. CoRR abs/1508.02284 (2015) - [i24]Hristina Mihajloska, Danilo Gligoroski, Simona Samardjiska:
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3. IACR Cryptol. ePrint Arch. 2015: 1028 (2015) - [i23]Britta Hale, Christopher Carr, Danilo Gligoroski:
CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite. IACR Cryptol. ePrint Arch. 2015: 1035 (2015) - 2014
- [j5]Yanling Chen, Markku Niemenmaa, A. J. Han Vinck, Danilo Gligoroski:
On the Error Detection Capability of One Check Digit. IEEE Trans. Inf. Theory 60(1): 261-270 (2014) - [c33]Natasa Ilievska, Danilo Gligoroski:
Error-Detecting Code Using Linear Quasigroups. ICT Innovations 2014: 309-318 - [c32]Danilo Gligoroski, Katina Kralevska:
Families of Optimal Binary Non-MDS Erasure Codes. ISIT 2014: 3150-3154 - [c31]Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Rune Erlend Jensen, Mohamed El-Hadedy:
π-Cipher: Authenticated Encryption for Big Data. NordSec 2014: 110-128 - [c30]Dijana Vukovic, Danilo Gligoroski, Zoran Djuric:
On Privacy Protection in the Internet Surveillance Era. SECRYPT 2014: 261-266 - [i22]Danilo Gligoroski, Simona Samardjiska, Håkon Jacobsen, Sergey Bezzateev:
McEliece in the world of Escher. IACR Cryptol. ePrint Arch. 2014: 360 (2014) - [i21]Simona Samardjiska, Danilo Gligoroski:
Linearity Measures for MQ Cryptography. IACR Cryptol. ePrint Arch. 2014: 703 (2014) - [i20]Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae:
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems. IACR Cryptol. ePrint Arch. 2014: 811 (2014) - 2013
- [j4]Yanling Chen, Danilo Gligoroski, Svein J. Knapskog:
On a special class of multivariate quadratic quasigroups (MQQs). J. Math. Cryptol. 7(2): 111-141 (2013) - [c29]Katina Kralevska, Danilo Gligoroski, Harald Øverby:
Balanced XOR-ed Coding. EUNICE 2013: 161-172 - [c28]Yanling Chen, E. Heimark, Danilo Gligoroski:
Personal Threshold in a Small Scale Text-Dependent Speaker Recognition. ISBAST 2013: 162-170 - 2012
- [c27]Simona Samardjiska, Danilo Gligoroski:
Towards a Secure Multivariate Identity-Based Encryption. ICT Innovations 2012: 59-69 - [c26]Hristina Mihajloska, Tolga Yalçin, Danilo Gligoroski:
How Lightweight Is the Hardware Implementation of Quasigroup S-Boxes. ICT Innovations 2012: 121-128 - [c25]Håkon Jacobsen, Simona Samardjiska, Danilo Gligoroski:
On the Strong and Weak Keys in MQQ-SIG. ICT Innovations 2012: 183-193 - [c24]Yanling Chen, Markku Niemenmaa, A. J. Han Vinck, Danilo Gligoroski:
On some properties of a check digit system. ISIT 2012: 1563-1567 - [i19]Danilo Gligoroski, Simona Samardjiska:
The Multivariate Probabilistic Encryption Scheme MQQ-ENC. IACR Cryptol. ePrint Arch. 2012: 328 (2012) - 2011
- [c23]Simona Samardjiska, Yanling Chen, Danilo Gligoroski:
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields. IAS 2011: 314-319 - [c22]Mohamed El-Hadedy, Danilo Gligoroski, Svein Johan Knapskog:
Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform. AHS 2011: 240-247 - [c21]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. INTRUST 2011: 184-203 - [c20]Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen:
Internationally Standardized Efficient Cryptographic Hash Function. SECRYPT 2011: 426-433 - [i18]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen:
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak. IACR Cryptol. ePrint Arch. 2011: 261 (2011) - 2010
- [c19]Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog:
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. IAS 2010: 44-47 - [c18]Jean-Charles Faugère, Rune Steinsmo Ødegård, Ludovic Perret, Danilo Gligoroski:
Analysis of the MQQ Public Key Cryptosystem. CANS 2010: 169-183 - [c17]Danilo Gligoroski:
Length Extension Attack on Narrow-Pipe SHA-3 Candidates. ICT Innovations 2010: 5-10 - [c16]Danilo Gligoroski, Vlastimil Klíma:
Practical Consequences of the Aberration of Narrow-Pipe Hash Designs from Ideal Random Functions. ICT Innovations 2010: 81-93 - [c15]Benedikt Westermann, Danilo Gligoroski, Svein J. Knapskog:
Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates. ICT Innovations 2010: 102-113 - [c14]Bendik B. Mjaaland, Patrick Bours, Danilo Gligoroski:
Walk the Walk: Attacking Gait Biometrics by Imitation. ISC 2010: 361-380 - [c13]Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog:
Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform. ReConFig 2010: 394-399 - [i17]Danilo Gligoroski, Svein Johan Knapskog, Smile Markovski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère:
The Digital Signature Scheme MQQ-SIG. CoRR abs/1010.3163 (2010) - [i16]Danilo Gligoroski, Vlastimil Klíma:
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions. IACR Cryptol. ePrint Arch. 2010: 384 (2010) - [i15]Vlastimil Klíma, Danilo Gligoroski:
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates. IACR Cryptol. ePrint Arch. 2010: 430 (2010) - [i14]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
The Digital Signature Scheme MQQ-SIG. IACR Cryptol. ePrint Arch. 2010: 527 (2010) - [i13]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform. IACR Cryptol. ePrint Arch. 2010: 571 (2010)
2000 – 2009
- 2009
- [j3]Goran Velinov, Margita Kon-Popovska, Danilo Gligoroski:
A Generalized Approach to Optimization of Relational Data Warehouses Using Hybrid Greedy and Genetic Algorithms. Sci. Ann. Comput. Sci. 19: 25-55 (2009) - [j2]Danilo Gligoroski:
On a Family of Minimal Candidate One-way Functions and One-way Permutations. Int. J. Netw. Secur. 8(3): 211-220 (2009) - [j1]Danilo Gligoroski, Smile Markovski, Ljupco Kocarev:
Edon-R, An Infinite Family of Cryptographic Hash Functions. Int. J. Netw. Secur. 8(3): 293-300 (2009) - [c12]Rune Steinsmo Ødegård, Danilo Gligoroski:
On the Randomness and Regularity of Reduced Edon-R Compression Function. Security and Management 2009: 521-525 - [c11]Danilo Gligoroski, Vlastimil Klíma:
On the Computational Asymmetry of the S-Boxes Present in Blue Midnight Wish Cryptographic Hash Function. ICT Innovations 2009: 391-400 - [c10]Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog:
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. IIH-MSP 2009: 1066-1071 - [c9]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms. INCoS 2009: 100-104 - [p3]Danilo Gligoroski, Vesna Dimitrova, Smile Markovski:
Quasigroups as Boolean Functions, Their Equation Systems and Gröbner Bases. Gröbner Bases, Coding, and Cryptography 2009: 415-420 - [p2]Danilo Gligoroski, Smile Markovski, Svein Johan Knapskog:
A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gröbner Bases. Gröbner Bases, Coding, and Cryptography 2009: 421-425 - [i12]Smile Markovski, Aleksandra Mileva, Vesna Dimitrova, Danilo Gligoroski:
On a Conditional Collision Attack on NaSHA-512. IACR Cryptol. ePrint Arch. 2009: 34 (2009) - [i11]Danilo Gligoroski, Rune Steinsmo Ødegård:
On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R. IACR Cryptol. ePrint Arch. 2009: 120 (2009) - [i10]Rune Steinsmo Ødegård, Danilo Gligoroski:
On the Randomness and Regularity of Reduced EDON-R Compression Function. IACR Cryptol. ePrint Arch. 2009: 234 (2009) - 2008
- [c8]Danilo Gligoroski, Suzana Andova, Svein J. Knapskog:
On the Importance of the Key Separation Principle for Different Modes of Operation. ISPEC 2008: 404-418 - [c7]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. ReConFig 2008: 427-432 - [p1]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
The Stream Cipher Edon80. The eSTREAM Finalists 2008: 152-169 - [i9]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. CoRR abs/0808.0247 (2008) - [i8]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. IACR Cryptol. ePrint Arch. 2008: 320 (2008) - [i7]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. IACR Cryptol. ePrint Arch. 2008: 339 (2008) - 2007
- [c6]Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. ARES 2007: 1222-1226 - [c5]Goran Velinov, Danilo Gligoroski, Margita Kon-Popovska:
Hybrid greedy and genetic algorithms for optimization of relational data warehouses. Artificial Intelligence and Applications 2007: 500-506 - [c4]Danilo Gligoroski, Smile Markovski, Ljupco Kocarev:
Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding. Security and Management 2007: 446-451 - [c3]Danilo Gligoroski, Smile Markovski, Ljupco Kocarev:
Error-Correcting Codes Based on Quasigroups. ICCCN 2007: 165-172 - [i6]Danilo Gligoroski, Svein Johan Knapskog:
Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions. IACR Cryptol. ePrint Arch. 2007: 154 (2007) - [i5]Danilo Gligoroski:
On the insecurity of interchanged use of OFB and CBC modes of operation. IACR Cryptol. ePrint Arch. 2007: 385 (2007) - [i4]Danilo Gligoroski, Svein Johan Knapskog:
Turbo SHA-2. IACR Cryptol. ePrint Arch. 2007: 403 (2007) - 2006
- [c2]Danilo Gligoroski, Svein J. Knapskog, Suzana Andova:
Cryptcoding - Encryption and Error-Correction Coding in a Single Step. Security and Management 2006: 145-151 - 2005
- [c1]Smile Markovski, Danilo Gligoroski, Ljupco Kocarev:
Unbiased Random Sequences from Quasigroup String Transformations. FSE 2005: 163-180 - [i3]Danilo Gligoroski:
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations. CoRR abs/cs/0510018 (2005) - [i2]Danilo Gligoroski:
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations. IACR Cryptol. ePrint Arch. 2005: 352 (2005) - 2004
- [i1]Danilo Gligoroski:
Stream cipher based on quasigroup string transformations in Zp*. CoRR cs.CR/0403043 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint