Blockchain in healthcare and health sciences—A scoping review A Hasselgren, K Kralevska, D Gligoroski, SA Pedersen, A Faxvaag International Journal of Medical Informatics 134, 104040, 2020 | 610 | 2020 |
New stream cipher designs: the eSTREAM finalists M Robshaw, O Billet Springer, 2008 | 293 | 2008 |
SoK of used cryptography in blockchain M Raikwar, D Gligoroski, K Kralevska IEEE Access 7, 148550-148575, 2019 | 200 | 2019 |
Quasigroup string processing: Part 4 S Markovski, V Bakeva Contributions, Section of Natural, Mathematical and Biotechnical Sciences, 2017 | 172 | 2017 |
Using quasigroups for one-one secure encoding S Markovski, D Gligoroski, S Andova Proc. VIII Conf. Logic and Computer Science “LIRA 97, 157-162, 1997 | 88 | 1997 |
Walk the walk: Attacking gait biometrics by imitation BB Mjaaland, P Bours, D Gligoroski Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 75 | 2011 |
Security issues in OpenStack R Slipetskyy Institutt for telematikk, 2011 | 63 | 2011 |
Cryptographic hash function Edon-R′ D Gligoroski, RS Ødegård, M Mihova, SJ Knapskog, A Drápal, V Klima, ... 2009 Proceedings of the 1st International Workshop on Security and …, 2009 | 63 | 2009 |
Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups D Gligoroski, S Markovski, SJ Knapskog Proceedings of the American Conference on Applied Mathematics, 44-49, 2008 | 63 | 2008 |
The stream cipher Edon80 D Gligoroski, S Markovski, SJ Knapskog New stream cipher designs: The eSTREAM finalists, 152-169, 2008 | 62 | 2008 |
Attacks on the transposition ciphers using optimization heuristics A Dimovski, D Gligoroski Proceedings of ICEST, 1-4, 2003 | 60 | 2003 |
Hashtag erasure codes: From theory to practice K Kralevska, D Gligoroski, RE Jensen, H Øverby IEEE Transactions on Big Data 4 (4), 516-529, 2017 | 57 | 2017 |
Cryptographic hash function blue midnight wish D Gligoroski, V Klima, SJ Knapskog, M El-Hadedy, J Amundsen 2009 Proceedings of the 1st International Workshop on Security and …, 2009 | 56 | 2009 |
A cloud-based SDN/NFV testbed for end-to-end network slicing in 4G/5G A Esmaeily, K Kralevska, D Gligoroski 2020 6th IEEE Conference on Network Softwarization (NetSoft), 29-35, 2020 | 52 | 2020 |
A public key block cipher based on multivariate quadratic quasigroups D Gligoroski, S Markovski, SJ Knapskog arXiv preprint arXiv:0808.0247, 2008 | 52 | 2008 |
Cryptcoding-Encryption and Error-Correction Coding in a Single Step. D Gligoroski, SJ Knapskog, S Andova Security and Management, 145-151, 2006 | 52 | 2006 |
Unbiased random sequences from quasigroup string transformations S Markovski, D Gligoroski, L Kocarev International workshop on fast software encryption, 163-180, 2005 | 46 | 2005 |
Trends in Development of Databases and Blockchain M Raikwar, D Gligoroski, G Velinov 2020 Seventh International Conference on Software Defined Systems (SDS), 177-182, 2020 | 43 | 2020 |
MQQ-SIG: An ultra-fast and provably CMA resistant digital signature scheme D Gligoroski, RS Ødegård, RE Jensen, L Perret, JC Faugere, ... International Conference on Trusted Systems, 184-203, 2011 | 43 | 2011 |
Edon-R, An Infinite Family of Cryptographic Hash Functions. D Gligoroski, S Markovski, L Kocarev Int. J. Netw. Secur. 8 (3), 293-300, 2009 | 42 | 2009 |