Danilo Gligoroski
Orcid: 0000-0002-7078-6139
According to our database1,
Danilo Gligoroski
authored at least 103 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023
2022
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise".
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Eighth International Conference on Software Defined Systems, 2021
Proceedings of the Euro-Par 2021: Parallel Processing Workshops, 2021
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021
Proceedings of the BIOTC 2021: The 3rd Blockchain and Internet of Things Conference, Ho Chi Minh City, Vietnam, July 8, 2021
2020
Int. J. Medical Informatics, 2020
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020
5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept.
Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020
VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
Proceedings of the 27th IEEE International Conference on Electronics, Circuits and Systems, 2020
2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
2018
On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields.
CoRR, 2018
An Explicit Construction of Systematic MDS Codes with Small Sub-Packetization for All-Node Repair.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018
2017
Locally Repairable and Locally Regenerating Codes Obtained by Parity-Splitting of HashTag Codes.
CoRR, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the 9th International Symposium on Turbo Codes and Iterative Information Processing, 2016
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
2015
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 38th International Convention on Information and Communication Technology, 2015
Approaching maximum embedding efficiency on small covers using Staircase-Generator codes.
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the IEEE International Conference on Communication, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the ICT Innovations 2014, 2014
2013
J. Math. Cryptol., 2013
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013
Proceedings of the Advances in Communication Networking, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the ICT Innovations 2012, 2012
Proceedings of the ICT Innovations 2012, 2012
Proceedings of the ICT Innovations 2012, 2012
2011
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak.
IACR Cryptol. ePrint Arch., 2011
Internationally Standardized Efficient Cryptographic Hash Function.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform.
Proceedings of the 2011 NASA/ESA Conference on Adaptive Hardware and Systems, 2011
Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates.
IACR Cryptol. ePrint Arch., 2010
Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Int. J. Netw. Secur., 2009
Int. J. Netw. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
A Generalized Approach to Optimization of Relational Data Warehouses Using Hybrid Greedy and Genetic Algorithms.
Sci. Ann. Comput. Sci., 2009
Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
On the Computational Asymmetry of the S-Boxes Present in Blue Midnight Wish Cryptographic Hash Function.
Proceedings of the ICT Innovations 2009, Ohrid, Macedonia, 28-30 September, 2009, 2009
A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009
2008
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008
IACR Cryptol. ePrint Arch., 2008
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security Practice and Experience, 2008
2007
Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions.
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding.
Proceedings of the 2007 International Conference on Security & Management, 2007
Hybrid greedy and genetic algorithms for optimization of relational data warehouses.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Cryptcoding - Encryption and Error-Correction Coding in a Single Step.
Proceedings of the 2006 International Conference on Security & Management, 2006
2005
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations.
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
Stream cipher based on quasigroup string transformations in Z<sub>p</sub><sup>*</sup>
CoRR, 2004