Danilo Gligoroski

Orcid: 0000-0002-7078-6139

According to our database1, Danilo Gligoroski authored at least 101 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Transformation for Lifting Discrete Logarithm Based Cryptography to Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2023

Web3 and Blockchain for Modernizing the Reseller Market.
Proceedings of the Fifth International Conference on Blockchain Computing and Applications, 2023

2022
Secure Service Implementation with Slice Isolation and WireGuard.
Proceedings of the IEEE International Mediterranean Conference on Communications and Networking, 2022

SoK: Decentralized Randomness Beacon Protocols.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise".
IACR Cryptol. ePrint Arch., 2021

Entropoid Based Cryptography.
IACR Cryptol. ePrint Arch., 2021

Aggregation in Blockchain Ecosystem.
Proceedings of the Eighth International Conference on Software Defined Systems, 2021

DoS Attacks on Blockchain Ecosystem.
Proceedings of the Euro-Par 2021: Parallel Processing Workshops, 2021

Non-Interactive VDF Client Puzzle for DoS Mitigation.
Proceedings of the EICC '21: European Interdisciplinary Cybersecurity Conference, 2021

The Meshwork Ledger, its Consensus and Reward Mechanisms.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

R3V: Robust Round Robin VDF-based Consensus.
Proceedings of the 3rd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2021

Efficient Novel Privacy Preserving PoS Protocol Proof-of-concept with Algorand.
Proceedings of the BIOTC 2021: The 3rd Blockchain and Internet of Things Conference, Ho Chi Minh City, Vietnam, July 8, 2021

2020
Blockchain in healthcare and health sciences - A scoping review.
Int. J. Medical Informatics, 2020

GDPR Compliance for Blockchain Applications in Healthcare.
CoRR, 2020

Vulnerability Analysis of 2500 Docker Hub Images.
CoRR, 2020

Trends in Development of Databases and Blockchain.
Proceedings of the 2020 Seventh International Conference on Software Defined Systems, 2020

5G Network Slice Isolation with WireGuard and Open Source MANO: A VPNaaS Proof-of-Concept.
Proceedings of the 2020 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2020

A Cloud-based SDN/NFV Testbed for End-to-End Network Slicing in 4G/5G.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

GDPR Compliant Blockchain and Distributed Ledger Technologies in the Health Sector.
Proceedings of the Digital Personalized Health and Medicine - Proceedings of MIE 2020, Medical Informatics Europe, Geneva, Switzerland, April 28, 2020

VerifyMed-A blockchain platform for transparent trust in virtualized healthcare: Proof-of-concept.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020

Micro - GAGE: A Low-power Compact GAGE Hash Function Processor for IoT Applications.
Proceedings of the 27th IEEE International Conference on Electronics, Circuits and Systems, 2020

2019
Network traffic driven storage repair.
Int. J. Big Data Intell., 2019

SoK of Used Cryptography in Blockchain.
IEEE Access, 2019

Expanded Combinatorial Designs as Tool to Model Network Slicing in 5G.
IEEE Access, 2019

Preventing DDoS with SDN in 5G.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

2018
HashTag Erasure Codes: From Theory to Practice.
IEEE Trans. Big Data, 2018

On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields.
CoRR, 2018

An Explicit Construction of Systematic MDS Codes with Small Sub-Packetization for All-Node Repair.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Locally Repairable and Locally Regenerating Codes Obtained by Parity-Splitting of HashTag Codes.
CoRR, 2017

Repair Duality with Locally Repairable and Locally Regenerating Codes.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
General Sub-Packetized Access-Optimal Regenerating Codes.
IEEE Commun. Lett., 2016

An Encryption Scheme based on Random Split of St-Gen Codes.
IACR Cryptol. ePrint Arch., 2016

A Digital Signature Scheme Based on Random Split of St-Gen Codes.
IACR Cryptol. ePrint Arch., 2016

Semantic Security and Key-Privacy With Random Split of St-Gen Codes.
IACR Cryptol. ePrint Arch., 2016

CARIBE: Cascaded IBE for Maximum Flexibility and User-Side Control.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Balanced locally repairable codes.
Proceedings of the 9th International Symposium on Turbo Codes and Iterative Information Processing, 2016

A 16-Bit Reconfigurable Encryption Processor for p-Cipher.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

2015
Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3.
IACR Cryptol. ePrint Arch., 2015

CARIBE: Adapting Traditional IBE for the Modern Key-Covetous Appetite.
IACR Cryptol. ePrint Arch., 2015

Simulation of a quasigroup error-detecting linear code.
Proceedings of the 38th International Convention on Information and Communication Technology, 2015

Approaching maximum embedding efficiency on small covers using Staircase-Generator codes.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Minimal header overhead for random linear network coding.
Proceedings of the IEEE International Conference on Communication, 2015

Coded Packet Transport for Optical Packet/Burst Switched Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

CryptoCloak protocol and the prototype application.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
On the Error Detection Capability of One Check Digit.
IEEE Trans. Inf. Theory, 2014

Linearity Measures for MQ Cryptography.
IACR Cryptol. ePrint Arch., 2014

McEliece in the world of Escher.
IACR Cryptol. ePrint Arch., 2014

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems.
IACR Cryptol. ePrint Arch., 2014

On Privacy Protection in the Internet Surveillance Era.
Proceedings of the SECRYPT 2014, 2014

π-Cipher: Authenticated Encryption for Big Data.
Proceedings of the Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, 2014

Families of Optimal Binary Non-MDS Erasure Codes.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Error-Detecting Code Using Linear Quasigroups.
Proceedings of the ICT Innovations 2014, 2014

2013
On a special class of multivariate quadratic quasigroups (MQQs).
J. Math. Cryptol., 2013

Personal Threshold in a Small Scale Text-Dependent Speaker Recognition.
Proceedings of the International Symposium on Biometrics and Security Technologies, 2013

Balanced XOR-ed Coding.
Proceedings of the Advances in Communication Networking, 2013

2012
The Multivariate Probabilistic Encryption Scheme MQQ-ENC.
IACR Cryptol. ePrint Arch., 2012

On some properties of a check digit system.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

Towards a Secure Multivariate Identity-Based Encryption.
Proceedings of the ICT Innovations 2012, 2012

How Lightweight Is the Hardware Implementation of Quasigroup S-Boxes.
Proceedings of the ICT Innovations 2012, 2012

On the Strong and Weak Keys in MQQ-SIG.
Proceedings of the ICT Innovations 2012, 2012

2011
OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak.
IACR Cryptol. ePrint Arch., 2011

Internationally Standardized Efficient Cryptographic Hash Function.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme.
Proceedings of the Trusted Systems - Third International Conference, 2011

Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform.
Proceedings of the 2011 NASA/ESA Conference on Adaptive Hardware and Systems, 2011

Construction of Multivariate Quadratic Quasigroups (MQQs) in arbitrary Galois fields.
Proceedings of the 7th International Conference on Information Assurance and Security, 2011

2010
Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates.
IACR Cryptol. ePrint Arch., 2010

The Digital Signature Scheme MQQ-SIG.
IACR Cryptol. ePrint Arch., 2010

Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions.
IACR Cryptol. ePrint Arch., 2010

Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform.
IACR Cryptol. ePrint Arch., 2010

Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform.
Proceedings of the ReConFig'10: 2010 International Conference on Reconfigurable Computing and FPGAs, 2010

Walk the Walk: Attacking Gait Biometrics by Imitation.
Proceedings of the Information Security - 13th International Conference, 2010

Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010

Length Extension Attack on Narrow-Pipe SHA-3 Candidates.
Proceedings of the ICT Innovations 2010 - Second International Conference, 2010

Analysis of the MQQ Public Key Cryptosystem.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Edon-R, An Infinite Family of Cryptographic Hash Functions.
Int. J. Netw. Secur., 2009

On a Family of Minimal Candidate One-way Functions and One-way Permutations.
Int. J. Netw. Secur., 2009

On the Randomness and Regularity of Reduced EDON-R Compression Function.
IACR Cryptol. ePrint Arch., 2009

On a Conditional Collision Attack on NaSHA-512.
IACR Cryptol. ePrint Arch., 2009

On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R.
IACR Cryptol. ePrint Arch., 2009

A Generalized Approach to Optimization of Relational Data Warehouses Using Hybrid Greedy and Genetic Algorithms.
Sci. Ann. Comput. Sci., 2009

Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms.
Proceedings of the 1st International Conference on Intelligent Networking and Collaborative Systems, 2009

The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

On the Computational Asymmetry of the S-Boxes Present in Blue Midnight Wish Cryptographic Hash Function.
Proceedings of the ICT Innovations 2009, Ohrid, Macedonia, 28-30 September, 2009, 2009

A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

Quasigroups as Boolean Functions, Their Equation Systems and Gröbner Bases.
Proceedings of the Gröbner Bases, Coding, and Cryptography, 2009

2008
The Stream Cipher Edon80.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

Public Key Block Cipher Based on Multivariate Quadratic Quasigroups.
IACR Cryptol. ePrint Arch., 2008

High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms.
IACR Cryptol. ePrint Arch., 2008

On the Importance of the Key Separation Principle for Different Modes of Operation.
Proceedings of the Information Security Practice and Experience, 2008

2007
Turbo SHA-2.
IACR Cryptol. ePrint Arch., 2007

Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions.
IACR Cryptol. ePrint Arch., 2007

On the insecurity of interchanged use of OFB and CBC modes of operation.
IACR Cryptol. ePrint Arch., 2007

Error-Correcting Codes Based on Quasigroups.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding.
Proceedings of the 2007 International Conference on Security & Management, 2007

Hybrid greedy and genetic algorithms for optimization of relational data warehouses.
Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, 2007

Bypassing Data Execution Prevention on MicrosoftWindows XP SP2.
Proceedings of the The Second International Conference on Availability, 2007

2006
Cryptcoding - Encryption and Error-Correction Coding in a Single Step.
Proceedings of the 2006 International Conference on Security & Management, 2006

2005
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations.
IACR Cryptol. ePrint Arch., 2005

Unbiased Random Sequences from Quasigroup String Transformations.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Stream cipher based on quasigroup string transformations in Z<sub>p</sub><sup>*</sup>
CoRR, 2004


  Loading...