Seguir
Danilo Gligoroski
Danilo Gligoroski
Professor of Information Security and Cryptology, NTNU
Dirección de correo verificada de item.ntnu.no
Título
Citado por
Citado por
Año
Blockchain in healthcare and health sciences—A scoping review
A Hasselgren, K Kralevska, D Gligoroski, SA Pedersen, A Faxvaag
International Journal of Medical Informatics 134, 104040, 2020
5822020
New stream cipher designs: the eSTREAM finalists
M Robshaw, O Billet
Springer, 2008
2922008
SoK of used cryptography in blockchain
M Raikwar, D Gligoroski, K Kralevska
IEEE Access 7, 148550-148575, 2019
1952019
Quasigroup string processing: Part 4
S Markovski, V Bakeva
Contributions, Section of Natural, Mathematical and Biotechnical Sciences, 2017
1722017
Using quasigroups for one-one secure encoding
S Markovski, D Gligoroski, S Andova
Proc. VIII Conf. Logic and Computer Science “LIRA 97, 157-162, 1997
881997
Walk the walk: Attacking gait biometrics by imitation
BB Mjaaland, P Bours, D Gligoroski
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
742011
Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups
D Gligoroski, S Markovski, SJ Knapskog
Proceedings of the American Conference on Applied Mathematics, 44-49, 2008
632008
Security issues in OpenStack
R Slipetskyy
Institutt for telematikk, 2011
622011
Cryptographic hash function Edon-R′
D Gligoroski, RS Ødegård, M Mihova, SJ Knapskog, A Drápal, V Klima, ...
2009 Proceedings of the 1st International Workshop on Security and …, 2009
622009
The stream cipher Edon80
D Gligoroski, S Markovski, SJ Knapskog
New stream cipher designs: The eSTREAM finalists, 152-169, 2008
622008
Attacks on the transposition ciphers using optimization heuristics
A Dimovski, D Gligoroski
Proceedings of ICEST, 1-4, 2003
602003
Hashtag erasure codes: From theory to practice
K Kralevska, D Gligoroski, RE Jensen, H Øverby
IEEE Transactions on Big Data 4 (4), 516-529, 2017
552017
Cryptographic hash function blue midnight wish
D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen
2009 Proceedings of the 1st International Workshop on Security and …, 2009
552009
Cryptcoding-Encryption and Error-Correction Coding in a Single Step.
D Gligoroski, SJ Knapskog, S Andova
Security and Management, 145-151, 2006
522006
A public key block cipher based on multivariate quadratic quasigroups
D Gligoroski, S Markovski, SJ Knapskog
arXiv preprint arXiv:0808.0247, 2008
512008
A cloud-based SDN/NFV testbed for end-to-end network slicing in 4G/5G
A Esmaeily, K Kralevska, D Gligoroski
2020 6th IEEE Conference on Network Softwarization (NetSoft), 29-35, 2020
502020
Unbiased random sequences from quasigroup string transformations
S Markovski, D Gligoroski, L Kocarev
International workshop on fast software encryption, 163-180, 2005
452005
MQQ-SIG: An ultra-fast and provably CMA resistant digital signature scheme
D Gligoroski, RS Ødegård, RE Jensen, L Perret, JC Faugere, ...
International Conference on Trusted Systems, 184-203, 2011
432011
Edon-R, An Infinite Family of Cryptographic Hash Functions.
D Gligoroski, S Markovski, L Kocarev
Int. J. Netw. Secur. 8 (3), 293-300, 2009
422009
Trends in Development of Databases and Blockchain
M Raikwar, D Gligoroski, G Velinov
2020 Seventh International Conference on Software Defined Systems (SDS), 177-182, 2020
412020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20