Current Research Information SysTem In Norway
 
 

 Norsk versjon


 
Mainpage
Research results/NVI
Researchers
Projects
Research units
Log in
About Cristin
 
 
   
Back to search     Short format     Full format    
Export to


Showing results 1-50 of 73 << Previous 1 2    Next >>

2024
1 Solberg, Morten Rotvold; Gjøsteen, Kristian; Haines, Thomas; Dragan, Constantin Catalin; Dupressoir, François; Rønne, Peter B..
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. I: Computer Security - ESORICS 2023. Springer 2024 ISBN 978-3-031-51478-4. p. 471-491
NTNU Untitled
 
2023
2 Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand Aga.
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. Proceedings of the ACM Conference on Computer and Communications Security 2023 p. 1467-1481
NTNU Untitled
 
3 Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise.
Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS) 2023 ;Volume 14411. p. 455-472
NTNU Untitled
 
4 Gellert, Kai; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor.
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. Lecture Notes in Computer Science (LNCS) 2023 ;Volume 14084. p. 297-329
NTNU UiO Untitled
 
5 Gjøsteen, Kristian; Haines, Thomas; Solberg, Morten Rotvold.
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. I: Electronic Voting. Springer 2023 ISBN 978-3-031-43755-7. p. 69-86
NTNU Untitled
 
6 Raikwar, Mayank; Wu, Shuang; Gjøsteen, Kristian.
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. I: Network and System Security 17th International Conference, NSS 2023 Canterbury, UK, August 14–16, 2023 Proceedings. Springer 2023 ISBN 978-3-031-39828-5. p. 137-154
UiO NTNU Untitled
 
7 Solberg, Morten Rotvold; Gjøsteen, Kristian.
Automated theorem provers and their role in cryptography.
NTNU Untitled
 
2022
8 Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.; Rønne, Peter B.; Solberg, Morten Rotvold.
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. I: 2022 IEEE 35th Computer Security Foundations Symposium (CSF). IEEE Press 2022 ISBN 978-1-6654-8417-6. p. 319-331
NTNU Untitled
 
9 Gjøsteen, Kristian.
Practical Mathematical Cryptography. CRC Press 2022 (ISBN 9780367710859) 546 p.
NTNU Untitled
 
10 Gjøsteen, Kristian; Fuchs, Franz Georg; Engesvik, Sara.
Kvantedatamaskiners destruktive potensiale: – Vi må forsikre oss mot at verden ramler sammen. https://www.digi.no/artikler/kvantedatamaskiners-destruktive [Internet] 2022-08-05
SINTEF NTNU Untitled
 
11 Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand.
Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS) 2022 ;Volume 13494. p. 355-374
NTNU Untitled
 
12 Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang.
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. I: Topics in Cryptology – CT-RSA 2022. Virtual Event: Springer Cham 2022 ISBN 978-3-030-95312-6. p. 589-619
NTNU Untitled
 
2021
13 Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor.
Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS) 2021 ;Volume 12704. p. 227-251
NTNU Untitled
 
14 de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia.
Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2021 ;Volume 12804. p. 451-479
NTNU Untitled
 
15 Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold.
Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS) 2021 ;Volume 12556. p. 92-107
NTNU Untitled
 
2020
16 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS) 2020 ;Volume 12170 LNCS. p. 464-493
NTNU Untitled
 
17 Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao.
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS) 2020 ;Volume 12248 LNCS. p. 82-101
NTNU Untitled
 
18 Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh.
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS) 2020 ;Volume 12455. p. 50-66
NTNU Untitled
 
19 Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A..
Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS) 2020 ;Volume 11599. p. 289-298
NTNU Untitled
 
20 Strand, Martin; Gjøsteen, Kristian.
Can there be efficient and natural FHE schemes?. CFAIL 2020: Conference for failed attempts and insightful losses; 2020-08-15 - 2020-08-15
FFI NTNU Untitled
 
21 wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander.
A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains; 2020-07-20 - 2020-07-21
NTNU Untitled
 
2019
22 Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund.
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS) 2019 ;Volume 11898. p. 250-270
NTNU Untitled
 
23 Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor.
Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2019 ;Volume 11694 LNCS. p. 767-797
NTNU Untitled
 
24 Cremers, Cas; Gjøsteen, Kristian; Jager, Tibor; Cohn-Gordon, Katriel.
Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2019
NTNU Untitled
 
2018
25 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volume 11060 LNCS. p. 268-285
NTNU Untitled
 
26 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Definitions for plaintext-existence hiding in cloud storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5.
UiB NTNU Untitled
 
27 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS) 2018 ;Volume 11192 LNCS. p. 347-365
UiB NTNU Untitled
 
28 Gjøsteen, Kristian; Jager, Tibor.
Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volume 10992 LNCS. p. 95-125
NTNU Untitled
 
29 Strand, Martin.
Fully homomorphic encryption with applications to electronic voting. Trondheim: Norges teknisk-naturvitenskaplige universitet 2018 (ISBN 978-82-326-2864-3) 185 p. Doktoravhandlinger ved NTNU(33)
NTNU Untitled
 
2017
30 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06
NTNU UiB Untitled
 
31 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. p. 266-274
NTNU UiB Untitled
 
32 Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16
NTNU UiB Untitled
 
33 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS) 2017 ;Volume 10311. p. 233-251
NTNU Untitled
 
34 Gjøsteen, Kristian; Strand, Martin.
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. I: Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer 2017 ISBN 978-3-319-70277-3. p. 404-418
NTNU Untitled
 
2016
35 Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volume 106. p. 17-18
UiB NTNU Untitled
 
36 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016; 2016-12-01 - 2016-12-02
NTNU Untitled
 
37 Gjøsteen, Kristian; Lund, Anders Smedstuen.
An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications 2016
NTNU Untitled
 
2014
38 Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René.
Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology 2014 ;Volume 28.(4) p. 796-819
NTNU Untitled
 
2012
39 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. I: Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Springer 2012 ISBN 978-3-642-29803-5. p. 17-33
NTNU Untitled
 
2011
40 Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS) 2011 ;Volume 6980. p. 340-347
NTNU Untitled
 
41 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. EuroPKI 2011; 2011-09-15 - 2011-09-16
NTNU Untitled
 
42 Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland.
Farene ved e-valg. Dagbladet 2011
UiB NTNU Untitled
 
43 Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Provable Security; 2011-10-16 - 2011-10-18
NTNU Untitled
 
44 Thuen, Øystein Øvreås.
Bilinear Pairings in Cryptography. : NTNU 2011 (ISBN 978-82-471-2828-2) 132 p. Doktoravhandlinger ved NTNU(143)
NTNU Untitled
 
2010
45 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010; 2010-11-23 - 2010-11-24
NTNU Untitled
 
46 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. p. 21-32
NTNU Untitled
 
2008
47 Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa.
A framework for compositional verification of security protocols. Information and Computation 2008 ;Volume 206.(2-4) p. 425-459
NTNU Untitled
 
48 Gjøsteen, Kristian.
A Latency-Free Election Scheme. RSA Conference 208; 2008-04-07 - 2008-04-11
NTNU Untitled
 
49 Gjøsteen, Kristian.
A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS) 2008 ;Volume 4964. p. 425-436
NTNU Untitled
 
50 Gjøsteen, Kristian.
Hvordan knekke nettbanken?. The Gathering 2008; 2008-03-19 - 2008-03-23
NTNU Untitled
 
    Show next list