#### Filter Results:

- Full text PDF available (89)

#### Publication Year

1997

2017

- This year (1)
- Last 5 years (34)
- Last 10 years (89)

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
- IACR Cryptology ePrint Archive
- 2008

– We have designed a new class of public key algorithms based on quasigroup string transformations using a specific class of quasigroups called multivariate quadratic quasigroups (MQQ). Our public key algorithm is a bijective mapping, it does not perform message expansions and can be used both for encryption and signatures. The public key consist of n… (More)

Given a nite set A we consider quasigroup operations 1 2 : : : n on A and we use them to deene transformations E (n) D (n) : A + ! A + , w h e r e A + is the set of all nite strings with members from A. W e show that the mappings E (n) and D (n) have s e v eral useful properties, suitable for many purposes in cryptography, coding theory, deening and… (More)

- Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, Jorn Amundsen
- 2009 Proceedings of the 1st International…
- 2009

The cryptographic hash function Blue Midnight Wish was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST).

- Danilo Gligoroski, Smile Markovski, Svein J. Knapskog
- The eSTREAM Finalists
- 2008

The need of true random number generators for many purposes (ranging from applications in cryptography and stochastic simulation , to search heuristics and game playing) is increasing every day. Many sources of randomness possess the property of stationarity. However , while a biased die may be a good source of entropy, many applications require input in… (More)

- Danilo Gligoroski, Rune Steinsmo Odegard, +5 authors Mohamed El-Hadedy
- 2009 Proceedings of the 1st International…
- 2009

In this paper we describe in details the tweaked cryptographic hash function Edon-R that we denote as Edon-R′. Edon-R was submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST). The difference between originally submitted version of Edon-R and version Edon-R′ is in the added… (More)

- Danilo Gligoroski, Smile Markovski, Ljupco Kocarev
- I. J. Network Security
- 2009

We propose a new infinite family of cryptographic hash functions, Edon–R, based on a recently defined candidate one-way function. Edon–R is a class of hash functions with variable output lengths. It is de fined using quasigroups and quasigroup string trans formations.

- BLUE MIDNIGHT WISH, Danilo Gligoroski, +4 authors Stig Frode Mjølsnes
- 2008

This is the supporting documentation that describes in details the cryptographic hash function BLUE MIDNIGHT WISH which is submitted as a candidate for SHA-3 hash competition organized by National Institute of Standards and Technology (NIST), according to the public call [1]. BLUE MIDNIGHT WISH is a cryptographic hash function with output size of n bits… (More)

- D. Gligoroski
- 2003

In this paper we describe several programming modules which perform string transformations with quasigroups. The modules use one or two quasigroups of order 16, thus, taking only 128 bytes for storage per quasigroup. Using those modules as cryptographic primitives we develop a block cipher, a stream cipher, a hash function with variable length of output… (More)

- Danilo Gligoroski, Rune Steinsmo Ødegård, +4 authors Smile Markovski
- IACR Cryptology ePrint Archive
- 2010

This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG-a new public key digital signature scheme. The complete scientific publication covering the design rationale and the security analysis will be given in a separate publication. MQQ-SIG consists of n − n 4 quadratic polynomials with n Boolean variables… (More)