Остановите войну!
for scientists:
default search action
Danilo Gligoroski
- > Home > Persons > Danilo Gligoroski
Publications
- 2013
- [j4]Yanling Chen, Danilo Gligoroski, Svein J. Knapskog:
On a special class of multivariate quadratic quasigroups (MQQs). J. Math. Cryptol. 7(2): 111-141 (2013) - 2011
- [c22]Mohamed El-Hadedy, Danilo Gligoroski, Svein Johan Knapskog:
Area efficient processing element architecture for compact hash functions systems on VIRTEX5 FPGA platform. AHS 2011: 240-247 - [c21]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme. INTRUST 2011: 184-203 - [c20]Danilo Gligoroski, Svein Johan Knapskog, Jørn Amundsen, Rune Erlend Jensen:
Internationally Standardized Efficient Cryptographic Hash Function. SECRYPT 2011: 426-433 - 2010
- [c19]Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog:
Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. IAS 2010: 44-47 - [c15]Benedikt Westermann, Danilo Gligoroski, Svein J. Knapskog:
Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates. ICT Innovations 2010: 102-113 - [c13]Mohamed El-Hadedy, Martin Margala, Danilo Gligoroski, Svein J. Knapskog:
Implementing the Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform. ReConFig 2010: 394-399 - [i17]Danilo Gligoroski, Svein Johan Knapskog, Smile Markovski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère:
The Digital Signature Scheme MQQ-SIG. CoRR abs/1010.3163 (2010) - [i14]Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen, Ludovic Perret, Jean-Charles Faugère, Svein Johan Knapskog, Smile Markovski:
The Digital Signature Scheme MQQ-SIG. IACR Cryptol. ePrint Arch. 2010: 527 (2010) - [i13]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform. IACR Cryptol. ePrint Arch. 2010: 571 (2010) - 2009
- [c10]Bendik B. Mjaaland, Danilo Gligoroski, Svein J. Knapskog:
The Altinn Case Study: Proposal for a Large-Scale Public-Key Biometric Infrastructure. IIH-MSP 2009: 1066-1071 - [c9]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
Low Area Implementation of the Hash Function "Blue Midnight Wish 256" for FPGA Platforms. INCoS 2009: 100-104 - [p2]Danilo Gligoroski, Smile Markovski, Svein Johan Knapskog:
A New Measure to Estimate Pseudo-Randomness of Boolean Functions and Relations with Gröbner Bases. Gröbner Bases, Coding, and Cryptography 2009: 421-425 - 2008
- [c8]Danilo Gligoroski, Suzana Andova, Svein J. Knapskog:
On the Importance of the Key Separation Principle for Different Modes of Operation. ISPEC 2008: 404-418 - [c7]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. ReConFig 2008: 427-432 - [p1]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
The Stream Cipher Edon80. The eSTREAM Finalists 2008: 152-169 - [i9]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. CoRR abs/0808.0247 (2008) - [i8]Danilo Gligoroski, Smile Markovski, Svein J. Knapskog:
Public Key Block Cipher Based on Multivariate Quadratic Quasigroups. IACR Cryptol. ePrint Arch. 2008: 320 (2008) - [i7]Mohamed El-Hadedy, Danilo Gligoroski, Svein J. Knapskog:
High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms. IACR Cryptol. ePrint Arch. 2008: 339 (2008) - 2007
- [c6]Nenad Stojanovski, Marjan Gusev, Danilo Gligoroski, Svein J. Knapskog:
Bypassing Data Execution Prevention on MicrosoftWindows XP SP2. ARES 2007: 1222-1226 - [i6]Danilo Gligoroski, Svein Johan Knapskog:
Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions. IACR Cryptol. ePrint Arch. 2007: 154 (2007) - [i4]Danilo Gligoroski, Svein Johan Knapskog:
Turbo SHA-2. IACR Cryptol. ePrint Arch. 2007: 403 (2007) - 2006
- [c2]Danilo Gligoroski, Svein J. Knapskog, Suzana Andova:
Cryptcoding - Encryption and Error-Correction Coding in a Single Step. Security and Management 2006: 145-151
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint