Danilo Gligoroski's publications

The latest list of publications is maintained in Cristin on the following link: https://www.cristin.no/as/WebObjects/cristin.woa/6/wa/fres?action=sok&pnr=31483&la=en&sort=ar

An older list that I maintained until 2009 is given below.


Books or journal papers

2009

1. Gligoroski Danilo, “On a Family of Minimal Candidate One-way Functions and One-way Permutations”, International Journal of Network Security 2009 ;Volume 8.(3) p. 211-220. (early version submitted at ePrint Archive: http://eprint.iacr.org/2005/352 )

2. Gligoroski, Danilo; Markovski, Smile; Kocarev, Ljupcho, “Edon-R, An Infinite Family of Cryptographic Hash Functions”, International Journal of Network Security 2009 ;Volume 8.(3) p. 293-300

3. Gligoroski, Danilo; Dimitrova, Vesna; Markovski, Smile, “Quasigroups as Boolean functions, their equation systems and Groebner bases”, Book: Groebner Bases, Coding, and Cryptography. Springer 2009 ISBN 978-3-540-93805-7

4. Gligoroski, Danilo; Markovski, Smile; Knapskog, Svein Johan, “A new measure to estimate pseudo-randomness of Boolean functions and relations with Groebner bases”, Book: Groebner Bases, Coding, and Cryptography. Springer 2009 ISBN 978-3-540-93805-7.

2008

5. Gligoroski, Danilo; Knapskog, Svein Johan, “Edon-R(256,384,512) an efficient implementation of Edon-R family of cryptographic hash functions”, Journal: Commentationes Mathematicae Universitatis Carolinae 2008; Volume 49.(2) p. 219-239.

6. Gligoroski, Danilo; Markovski, Smile; Knapskog, Svein Johan, “The Stream Cipher Edon80”, Book: New Stream Cipher Designs: The eSTREAM Finalists, Series: Lecture Notes in Computer Science 2008 ;Volume 4986. p. 152-169

7. Velinov, G.; Kon-Popovska, M.; Gligoroski, Danilo, “Framework for Generalization and Improvement of Relational Data Warehouses”. International Journal of Computer Science and Network Security 2008 ;Volume 8.(3) p. 32-40

2007

8. N. Stojanovski, D. Gligoroski and S. J. Knapskog, “Alternative Data Streams in NTFS ¬ A Gateway for Subverting Endpoint Security Systems”, The International Journal of Computer Science and Information Security – IJCSNS, ISSN : 1738-7906, Vol 7, No 10, October 25, 2007.

9. Selim Aissi, Hamid R. Arabnia, Kevin Daimi, Danilo Gligoroski, George Markowski, Ashu M. G. Solo, Proc. International Conference on Security & Management - 2007, CSREA Press©, ISBN: 1-60132-048-5, Las Vegas, June 2007.

10. D. Gligoroski and V. Dimitrova and S. Markovski, “Classification of Quasigroups as Boolean Functions, their Algebraic Complexity and Application of Gröbner Bases in Solving Systems of Quasigroup Equations”, Invited short-note for RISC Book Series, Springer, “Groebner, Coding, and Cryptography”, Ed. M. Sala, 2007.

11. D. Gligoroski and S. Markovski and S. J. Knapskog, “Gröbner Bases + Slow Iterative Approach to the Level of a Random Boolean Function = Weaknesses in Cryptographic Hash Function”, Invited short-note for RISC Book Series, Springer, “Groebner, Coding, and Cryptography”, Ed. M. Sala, 2007.

12. D. Gligoroski, Marie Elisabeth Gaup Moe, “On deviations of the AES S-box when represented as vector valued Boolean function”, The International Journal of Computer Science and Information Security – IJCSNS, ISSN : 1738-7906, Vol 7, No 4, April 25, pp 156-161, 2007, http://paper.ijcsns.org/07_book/200704/20070421.pdf

13. D. Gligoroski and S. J. Knapskog, “Adding MAC Functionality to Edon80”, International Journal of Computer Science and Network Security – IJCSNS, ISSN : 1738-7906, Vol.7, No.1, January 25, pp. 194-204, 2007, http://paper.ijcsns.org/07_book/200701/200701B03.pdf

2006

14. D. Gligoroski and S. Markovski and S. J. Knapskog, “A Secure Hash Algorithm with only 8 Folded SHA-1 Steps”, International Journal of Computer Science and Network Security – IJCSNS, ISSN : 1738-7906, Vol.6, No.10, October 30, 194-205, 2006, http://paper.ijcsns.org/07_book/200610/200610B09.pdf

15. D. Gligoroski, S. J. Knapskog and S. Andova, “Schemes for secure management of digitally produced documents”, WIT Transactions on Information and Communication Technologies, Vol 36, © 2006 WIT Press, ISSN 1743-3517, 2006, 425-434, http://library.witpress.com/pages/PaperInfo.asp?PaperID=16326

2005

16. S. Markovski, D. Gligoroski, J. Markovski, “Classification of Quasigroups by Random Walk on Torus - extended version”, J.Appl. Math. & Computing Vol. 19(2005), No. 1 - 2, pp. 57 – 75, http://www.jamc.net/contents/table_contents_view.php?Len=&idx=350#

2004

17. D. Gligoroski, “Stream cipher based on quasigroup string transformations in $Z_p^*$”, Macedonian Academy of Science and Arts, annual Proceedings in Mathematical and Technical Sciences, 2004.

2001

18. S. Markovski, D. Gligoroski, V. Bakeva, “Random walk tests for pseudo-random number generators”, in Mathematical Communications of Croatian Mathematical Society 6(2001) No.2, 135-143.

2000

19. S. Markovski, D. Gligoroski, B. Stojčevska, “Secure two-way on-line communication by using quasigroup enciphering with almost public key”, in Novi Sad Journal of Mathematics, 30(2000) No. 2.

1999

20. S. Markovski, D. Gligoroski, V. Bakeva, “Quasigroup String Processing: Part 1”, Maced. Acad. of Sci. and Arts, Sc. Math. Tech. Scien. XX 1-2(1999) 13-28.

1996

21. D. Gligoroski, D. Dimovski, V. Urumov, L. Kocarev, L. O. Chua, “A method for secure communication by time targeting of the trajectories of chaotic systems” , International Journal of Bifurcation and Chaos, 6, (1996), 2119-2124.

1995

22. D. Gligoroski, D. Dimovski, V. Urumov, “Control in multidimensional chaotic systems by small perturbations”, Phys. Rev. E, 51, 1690-1694, (1995).

Conference or workshop papers (or talks)

2008

1. El-Hadedy, Mohamed; Gligoroski, Danilo; Knapskog, Svein Johan, “High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms”, Reconfigurable Computing and FPGAs, 2008. ReConFig '08.

2. Gligoroski, Danilo; Andova, Suzana; Knapskog, Svein Johan, “On the Importance of the Key Separation Principle for Different Modes of Operation”, Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, Lecture Notes in Computer Science 2008 ;Volume 4991. p. 404-418

3. Gligoroski, Danilo; Markovski, Smile; Knapskog, Svein Johan, “Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups”, American Conference on Applied Mathematics; Harvard, March 2008, USA.

2007

4. D. Gligoroski, “Construction of huge quasigroups and fast cryptographic hash functions”, International Mathematical Conference - Loops '07, Prague, Czech Republic, August 19 - August 25, 2007.

5. D. Gligoroski, S. Markovski and L. Kocarev, “Error-Correcting Codes Based on Quasigroups”, Proc. IEEE 16th International Conference on Computer Communications and Networks Aug. 13 - 15, 2007, Honolulu, Hawaii USA, pp. 165 - 172.

6. D. Gligoroski, S. Markovski, L. Kocarev, “Totally Asynchronous Stream Ciphers + Redundancy = Cryptcoding”, Proc. International Conference on Security & Management - 2007, CSREA Press©, ISBN: 1-60132-048-5, Las Vegas, June 2007.

7. N. Stojanovski, M. Gusev, D. Gligoroski and S. J. Knapskog, “Bypassing Data Execution Prevention on Microsoft Windows XP SP2”, Proc. IEEE 2nd International Conference on Availability, Reliability and Security, Vienna University of Technology, April 10-13, 2007, pp. 1222 - 1226.

8. G. Velinov, D. Gligoroski, and M. Kon-Popovska, “Hybrid Greedy and Genetic Algorithms for Optimization of Relational Data Warehouses”, Proc. Artificial Intelligence and Applications - AIA 2007, 25th IASTED International Multi-Conference on APPLIED INFORMATICS, ISBN: 978-0-88986-629-4, Innsbruck, Austria, February 12–14, 2007.

9. D. Gligoroski and S. J. Knapskog, “Adding MAC Functionality to Edon80”, State of the Art of Stream Ciphers – SASC 2007, Bochum Germany, ECRYPT - Network of Excellence in Cryptology. An updated version of the paper was published in http://www.ijcsns.org/04_journal/200701/200701B03.pdf

2006

10. D. Gligoroski, S. Markovski, L. Kocarev, “Edon-R Family of Cryptographic Hash Functions”, The Second NIST Cryptographic Hash Workshop, UCSB, August 24-25, 2006, Santa Barbara, CA, http://www.csrc.nist.gov/pki/HashWorkshop/2006/Papers/GLIGOROSKI_EdonR-ver06.pdf

11. G. Velinov, D. Gligoroski, and M. Kon-Popovska, “Recessive Bits in Genetic Algorithm for Some Optimization Problems in Relational Data Warehouses”, Proc. of Third International Bulgarian-Turkish Conference - Computer Science'06, Istanbul, Turkey, October 2006.

12. G. Velinov, M. Kon-Popovska, and D. Gligoroski, “Vertical Fragmentation in Relational Data Warehouses”, Proc of ROSYCS 2006, Database Theory and Practice in the context of (Semantic) Web Technologies, ISSN 1224-2268, Iasi, Romania, Sept. 19-20, 2006.

13. G. Velinov, M. Kon-Popovska, and D. Gligoroski, “Optimization of Relational Data Warehouses”, Advances in Intelligent Systems and Technologies, Proc. ECIT2006 – 4th European Conference on Intelligent Systems and Technologies, ISBN (10) 973-730-246-X and ISBN (13) 978-973-730-246-5, Iasi, Romania, Sept. 21-23, 2006.

14. D. Gligoroski, S. J. Knapskog and S. Andova, “Cryptcoding - Encryption and Error-Correction Coding in a Single Step”, Proc. International Conference on Security & Management, Las Vegas, CSREA Press©, ISBN: 1-932415-99-8, June 2006.

15. D. Gligoroski and S. Markovski and S. J. Knapskog, “On periods of Edon-(2m,2k) Family of Stream Ciphers”, SASC06 - Stream Cipher Revisited, ECRYPT - Network of Excellence in Cryptology, Feb 2006, Leuven, Belgium, http://www.ecrypt.eu.org/stream/edon80.html.

2005

16. D. Gligoroski, S. Markovski, S.J. Knapskog, “A Fix of the MD4 Family of Hash Functions - Quasigroup Fold”, NIST Cryptographic Hash Workshop, NIST in Gaithersburg, Maryland, USA, Oct. 31 - Nov. 1, 2005, http://www.csrc.nist.gov/pki/HashWorkshop/2005/Nov1_Presentations/Gligoroski_MD4Fix.pdf

17. D. Gligoroski, S. Markovski, L. Kocarev, and M. Gusev, “Edon80 – Hardware Synchronous stream cipher”, SKEW 2005 - Symmetric Key Encryption Workshop, May 2005, Aarhus Denmark, http://www2.mat.dtu.dk/people/Lars.R.Knudsen/stvl/ and http://www.ecrypt.eu.org/stream/edon80.html .

18. S. Markovski, D. Gligoroski, L. Kocarev, “Unbiased Random Sequences from Quasigroup String Transformations”, 12th International Workshop FSE 2005, Paris, February, 2005, LNCS, vol. 3557, p 163, Springer-Verlag, Germany, http://www.springerlink.com/content/1eefvl0k163lwvc1/

2004

19. D. Gligoroski, S. Markovski, L. Kocarev, “New Directions in Coding: From Statistical Physics to Quasigroup String Transformations” , International Symposium on Nonlinear Theory and its Applications, NOLTA2004, Fukuoka, Japan, November 29 - December 3, 2004.

20. S. Markovski, D. Gligoroski, J. Markovski, “Classification of Quasigroups by Random Walk on Torus”, The IJCAR 2004 Workshop on Computer-Supported Mathematical Theory Development, Cork, Ireland, July 05, 2004.

2003

21. A.Dimovski, D.Gligoroski, “Generating highly nonlinear Boolean functions using a Genetic algorithm”, Proc. IEEE 6th International Conference on Telecommunications in Modern Satellite, Cable and Broadcasting Service, 2003. TELSIKS 2003, pp. 604 - 607.

22. A.Dimovski, D.Gligoroski, “Attacks On the Transposition Ciphers using Optimization Heuristics”, in Proceedings of ICEST 2003, October 2003, Sofia, Bulgaria.

23. D. Gligoroski, S. Markovski, V. Bakeva, “On Infinite Class of Strongly Collision Resistant Hash Functions “EDON-F” with Variable Length of Output”, in Proceedings of 1st International Conference On Mathematics and Informatics for Industry, April, 2003, 302-308, Thessaloniki, Greece.

2001

24. S. Markovski, D. Gligoroski, V. Bakeva, “Hash functions defined by quasigroup enciphering methods”, in Proceedings of the 6th International Conference on Discrete Mathematics and Applications, August 31 - September 2, Bansko, Bulgaria, 2001.

1997

25. S. Markovski, D. Gligoroski, S. Andova, “Using quasigroups for one-one secure encoding”, in Proceedings of VIII-th Conference for Logic and Computing - LIRA'97, September 1997, Novi Sad, FR Yugoslavia.

1995

26. A. Madevska, S. Markovski and D. Gligoroski, “Algorithms for Dirichlet Tessellation”, In Proceedings of VII-th Conference for Logic and Computing - LIRA'95, September 1995, Novi Sad, FR Yugoslavia.

27. V. Cabukovski, D. Gligoroski, N. De M. Rudolf and N. Mahmood, “Analysis of Deterministic Epilepti-form EEG signals by an Algorithm for Controlling Chaos”, The International Conference of Clinical Applications of advanced EEG data processing, Rome, Italy 1995.

TECHNICAL REPORTS, SCIENTIFIC ABSTRACTS AND POSTERS:

1. Danilo Gligoroski, Rune Steinsmo Odegaard, Marija Mihova, Svein Johan Knapskog, Ljupco Kocarev, Ales Drapal and Vlastimil Klima, Cryptographic Hash Function EDON-R”, SHA-3 Submission and Round-1 candidate, http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Edon-RUpdate.zip

2. Danilo Gligoroski, Vlastimil Klima, Svein Johan Knapskog, Mohamed El-Hadedy, Joern Amundsen and Stig Frode Mjoelsnes , “Cryptographic Hash Function BLUE MIDNIGHT WISH”, SHA-3 Submission and Round-1 candidate, http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/documents/Blue_Midnight_Wish.zip

3. D. Gligoroski and S. J. Knapskog, “Turbo SHA-2”, Cryptology ePrint Archive: Report 2007/403.

4. D. Gligoroski, “On the insecurity of interchanged use of OFB and CBC modes of operation”, Cryptology ePrint Archive: Report 2007/385.

5. D. Gligoroski and S. J. Knapskog, “Edon-R(256,384,512) - an Efficient Implementation of Edon-R Family of Cryptographic Hash Functions”, Cryptology ePrint Archive: Report 2007/154.

6. V. Dimitrova and S. Markovski and D. Gligoroski, “Classification of Quasigroups as Boolean Functions, their Algebraic Complexity and Application of Gröbner Bases in Solving Systems of Quasigroup Equations”, poster at special semester on Gröbner Bases, May 2006.

7. D. Gligoroski and S. Markovski and S. J. Knapskog, “Gröbner Bases + Slow Iterative Approach to the Level of a Random Boolean Function = Weaknesses in Cryptographic Hash Function”, poster at special semester on Gröbner Bases, May 2006.

8. Marie Elisabet Gaup Moe and D. Gligoroski, “On Deviations of the AES S-box when Represented in GF(28)”, student session of NORDSEC 2005, Tallinn, Estonia, 2005.

9. D. Gligoroski, “Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations”, Cryptology ePrint Archive: Report 2005/352.

10. D. Gligoroski, S. Markovski, L. Kocarev, M. Gusev, “Understanding Periods in Edon80 - Response on Remarks on the Period of Edon80, by Jin Hong”, ECRYPT Stream Cipher Project - http://www.ecrypt.eu.org/stream/papers.html, July, 2005.

11. A. Dimovski, D. Gligoroski, “Attack On the Polyalphabetic Substitution Cipher Using a Parallel Genetic Algorithm”, Technical report, Swiss-Macedonian scientific cooperation trought SCOPES project, Ohrid, Macedonia, March 2003.

12. A. Dimovski, D. Gligoroski,“Genetic Algorthms and Genetic Programming”, Technical Report, Institute of Informatics, Faculty of Natural Sciences and Mathematics, SS Cyril & Methodius University, Skopje, Macedonia, January 2003.

13. D. Gligoroski, D. Dimovski, L. Kocarev and V. Urumov, “Coding messages with time targeting of the trajectories of chaotic dynamical systems”, First Congress of the Mathematicians and Computer Scientists the Republic of Macedonia, 1996.

14. D. Gligoroski and D. Dimovski, “A theorem for dynamical determination of the global minimum in a problem of controlling chaotic dynamical systems”, First Congress of the Mathematicians and Computer Scientists the Republic of Macedonia, 1996.

15. D. Gligoroski, S. Markovski and S. Andova, “Fast algorithm for coding messages with transformations on quasigroups”, First Congress of the Mathematicians and Computer Scientists the Republic of Macedonia, 1996.

16. D. Gligoroski, D. Dimovski, L. Kocarev and V. Urumov, “Control of spatiotemporal chaos in a lattice of coupled nonlinear oscillators”, First Congress of the Physicists of the Republic of Macedonia 1996.

17. D. Gligoroski, “An algorithm for controlling chaos with many applications”, Workshop on nonlinear control and control of chaos - ICTP, Trieste, Italy, 1996.

18. D. Gligoroski, “An algorithm for controlling chaotic dynamics systems and its applications”, Workshop on Nonlinearity: Noise in nonlinear systems - ICTP, Trieste, Italy, 1995.

19. D. Gligoroski, A. Madevska, “Feedback transducer - nonperiodic series obtained with finite automata”, IV thematic symposium ETAI 1993, Ohrid.

20. A. Madevska, D. Gligoroski, M. Gusev, “Parallel implementation of Dirichlet tessellation”, thematic symposium ETAI 1993, Ohrid.

21. D. Gligoroski, D. Dimovski, V. Urumov, “Controlling multidimensional chaotic systems by small perturbations”, IV thematic symposium ETAI 1993, Ohrid.

22. D. Gligoroski, D. Dimovski, V. Urumov, “Periodic trajectories in multidimensional chaotic systems obtained by small perturbations”, Dynamic Days, Poznan, Poland, June 1993.

23. M. Gusev, J. Tasic, V. Radevski, D. Gligoroski, “Analysis, synthesis and simulation of VLSI Algorithms”, XXXV YU Symposium ETAN 1991, Ohrid,

INVITED TALKS AND PRESENTATIONS:

1. “Edon-R(256,384,512) – an Efficient Implementation of Edon-R Family of Cryptographic Hash Functions”, 2nd Benelux Workshop on Information and System Security, Luxembourg city, Luxembourg, September 20-21, 2007.

2. “Construction of huge quasigroups of orders 2256, 2384 and 2512 for construction of fast cryptographic hash functions”, Loops'07, International Mathematical Conference Prague, Czech Republic, August 19 - August 25, 2007.

3. “Speed asymmetry of Edon80 stream cipher and its possible application in DRM”, talk at the Council Meeting of the Department of Telematics, Faculty of Information Technology, Mathematics and Electrical Engineering, The Norwegian University of Science and Technology, May 2007.

4. “Using quasigroups for PRNGs, Cryptographic Hash Functions, Stream Ciphers, One-way Functions, One-way Permutations, and Random Error Correcting Codes”, talk at Q2S Colloquium, http://www.q2s.ntnu.no/q2sfc/history.php, Aug. 2005.

5. “Quasigroup transformations and their cryptographic potentials”, talk at EIDMA Cryptography Working Group, Utrecht, October 10, 2003.

6. “Several algorithms for Control of chaotic systems”, invited lecturer in a course “Dynamical systems with applications and Cryptology” as a part of DAAD Project: Center of Excellence for applications of mathematics, September, 2002, Struga Macedonia.

7. “Mathematical basics and standardization of PKI”, invited talk at Macedonian Conference of IT - LS VIP 2002, March 2002, Skopje, Macedonia.

8. “Current situation of IT in Macedonia” , invited talk at Telecom Regional Symposium, January 2002, Skopje, Macedonia.

9. “Capacity of quasigroups for generating information”, invited talk at 2nd CiiT Conference of Informatics and Information Technology, December 2001, Molika, Macedonia.

10. Lecturer of the course: “Computer viruses” at The Summer School in Permanent education of the professors in high schools in Republic of Macedonia, 1996.

11. Lecturer of the course: “Multimedia systems” at The Summer School in Permanent education of the professors in high schools in Republic of Macedonia, 1995.