关注
Danilo Gligoroski
Danilo Gligoroski
Professor of Information Security and Cryptology, NTNU
在 item.ntnu.no 的电子邮件经过验证
标题
引用次数
引用次数
年份
Blockchain in healthcare and health sciences—A scoping review
A Hasselgren, K Kralevska, D Gligoroski, SA Pedersen, A Faxvaag
International Journal of Medical Informatics 134, 104040, 2020
6102020
New stream cipher designs: the eSTREAM finalists
M Robshaw, O Billet
Springer, 2008
2932008
SoK of used cryptography in blockchain
M Raikwar, D Gligoroski, K Kralevska
IEEE Access 7, 148550-148575, 2019
2002019
Quasigroup string processing: Part 4
S Markovski, V Bakeva
Contributions, Section of Natural, Mathematical and Biotechnical Sciences, 2017
1722017
Using quasigroups for one-one secure encoding
S Markovski, D Gligoroski, S Andova
Proc. VIII Conf. Logic and Computer Science “LIRA 97, 157-162, 1997
881997
Walk the walk: Attacking gait biometrics by imitation
BB Mjaaland, P Bours, D Gligoroski
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
752011
Security issues in OpenStack
R Slipetskyy
Institutt for telematikk, 2011
632011
Cryptographic hash function Edon-R′
D Gligoroski, RS Ødegård, M Mihova, SJ Knapskog, A Drápal, V Klima, ...
2009 Proceedings of the 1st International Workshop on Security and …, 2009
632009
Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups
D Gligoroski, S Markovski, SJ Knapskog
Proceedings of the American Conference on Applied Mathematics, 44-49, 2008
632008
The stream cipher Edon80
D Gligoroski, S Markovski, SJ Knapskog
New stream cipher designs: The eSTREAM finalists, 152-169, 2008
622008
Attacks on the transposition ciphers using optimization heuristics
A Dimovski, D Gligoroski
Proceedings of ICEST, 1-4, 2003
602003
Hashtag erasure codes: From theory to practice
K Kralevska, D Gligoroski, RE Jensen, H Øverby
IEEE Transactions on Big Data 4 (4), 516-529, 2017
572017
Cryptographic hash function blue midnight wish
D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen
2009 Proceedings of the 1st International Workshop on Security and …, 2009
562009
A cloud-based SDN/NFV testbed for end-to-end network slicing in 4G/5G
A Esmaeily, K Kralevska, D Gligoroski
2020 6th IEEE Conference on Network Softwarization (NetSoft), 29-35, 2020
522020
A public key block cipher based on multivariate quadratic quasigroups
D Gligoroski, S Markovski, SJ Knapskog
arXiv preprint arXiv:0808.0247, 2008
522008
Cryptcoding-Encryption and Error-Correction Coding in a Single Step.
D Gligoroski, SJ Knapskog, S Andova
Security and Management, 145-151, 2006
522006
Unbiased random sequences from quasigroup string transformations
S Markovski, D Gligoroski, L Kocarev
International workshop on fast software encryption, 163-180, 2005
462005
Trends in Development of Databases and Blockchain
M Raikwar, D Gligoroski, G Velinov
2020 Seventh International Conference on Software Defined Systems (SDS), 177-182, 2020
432020
MQQ-SIG: An ultra-fast and provably CMA resistant digital signature scheme
D Gligoroski, RS Ødegård, RE Jensen, L Perret, JC Faugere, ...
International Conference on Trusted Systems, 184-203, 2011
432011
Edon-R, An Infinite Family of Cryptographic Hash Functions.
D Gligoroski, S Markovski, L Kocarev
Int. J. Netw. Secur. 8 (3), 293-300, 2009
422009
系统目前无法执行此操作,请稍后再试。
文章 1–20