Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 56 << Forrige 1 2    Neste >>

2020
1 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12170 LNCS. s. 464-493
NTNU Untitled
 
2 Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao.
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12248 LNCS. s. 82-101
NTNU Untitled
 
3 Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Ryan, Peter Y. A..
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS) 2020
NTNU Untitled
 
4 Strand, Martin; Gjøsteen, Kristian.
Can there be efficient and natural FHE schemes?. CFAIL 2020: Conference for failed attempts and insightful losses; 2020-08-15 - 2020-08-15
FFI NTNU Untitled
 
5 wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander.
A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains; 2020-07-20 - 2020-07-21
NTNU Untitled
 
2019
6 Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund.
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11898. s. 250-270
NTNU Untitled
 
7 Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor.
Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11694 LNCS. s. 767-797
NTNU Untitled
 
2018
8 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11060 LNCS. s. 268-285
NTNU Untitled
 
9 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Definitions for Plaintext-Existence Hiding in Cloud Storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5.
NTNU UiB Untitled
 
10 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11192 LNCS. s. 347-365
NTNU UiB Untitled
 
11 Gjøsteen, Kristian; Jager, Tibor.
Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10992 LNCS. s. 95-125
NTNU Untitled
 
12 Strand, Martin.
Fully homomorphic encryption with applications to electronic voting. Trondheim: Norges teknisk-naturvitenskaplige universitet 2018 (ISBN 978-82-326-2864-3) 185 s. Doktoravhandlinger ved NTNU(33)
NTNU Untitled
 
2017
13 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06
NTNU UiB Untitled
 
14 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. s. 266-274
NTNU UiB Untitled
 
15 Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16
NTNU UiB Untitled
 
16 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10311. s. 233-251
NTNU Untitled
 
17 Gjøsteen, Kristian; Strand, Martin.
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. I: Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer 2017 ISBN 978-3-319-70277-3. s. 404-418
NTNU Untitled
 
2016
18 Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18
NTNU UiB Untitled
 
19 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016; 2016-12-01 - 2016-12-02
NTNU Untitled
 
20 Gjøsteen, Kristian; Lund, Anders Smedstuen.
An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications 2016
NTNU Untitled
 
2014
21 Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René.
Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology 2014 ;Volum 28.(4) s. 796-819
NTNU Untitled
 
2012
22 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. I: Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Springer 2012 ISBN 978-3-642-29803-5. s. 17-33
NTNU Untitled
 
2011
23 Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS) 2011 ;Volum 6980. s. 340-347
NTNU Untitled
 
24 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. EuroPKI 2011; 2011-09-15 - 2011-09-16
NTNU Untitled
 
25 Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland.
Farene ved e-valg. Dagbladet 2011
NTNU UiB Untitled
 
26 Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Provable Security; 2011-10-16 - 2011-10-18
NTNU Untitled
 
27 Thuen, Øystein Øvreås.
Bilinear Pairings in Cryptography. : NTNU 2011 (ISBN 978-82-471-2828-2) 132 s. Doktoravhandlinger ved NTNU(143)
NTNU Untitled
 
2010
28 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010; 2010-11-23 - 2010-11-24
NTNU Untitled
 
29 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. s. 21-32
NTNU Untitled
 
2008
30 Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa.
A framework for compositional verification of security protocols. Information and Computation 2008 ;Volum 206.(2-4) s. 425-459
NTNU Untitled
 
31 Gjøsteen, Kristian.
A Latency-Free Election Scheme. RSA Conference 208; 2008-04-07 - 2008-04-11
NTNU Untitled
 
32 Gjøsteen, Kristian.
A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 4964. s. 425-436
NTNU Untitled
 
33 Gjøsteen, Kristian.
Hvordan knekke nettbanken?. The Gathering 2008; 2008-03-19 - 2008-03-23
NTNU Untitled
 
34 Gjøsteen, Kristian.
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008; 2008-06-16 - 2008-06-17
NTNU Untitled
 
35 Gjøsteen, Kristian.
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 5057. s. 196-206
NTNU Untitled
 
36 Gjøsteen, Kristian; Kråkmo, Lillian.
Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 5324. s. 112-126
NTNU Untitled
 
37 Gjøsteen, Kristian; Kråkmo, Lillian.
Round-Optimal Blind Signatures from Waters Signatures. Provable Security; 2008-10-30 - 2008-11-01
NTNU Untitled
 
2007
38 Brown, Daniel R. L.; Gjøsteen, Kristian.
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007; 2007-08-19 - 2007-08-23
NTNU Untitled
 
39 Brown, Daniel R. L.; Gjøsteen, Kristian.
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS) 2007 ;Volum 4622. s. 466-481
NTNU Untitled
 
40 Gjøsteen, Kristian.
Kryptografi og Minside. Vitenskapskafe; 2007-01-25 - 2007-01-25
NTNU Untitled
 
41 Gjøsteen, Kristian; Hole, Kjell Jørgen.
Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.) 2007
NTNU UiB Untitled
 
42 Gjøsteen, Kristian; Kråkmo, Lillian.
Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS) 2007 ;Volum 4582. s. 346-353
NTNU Untitled
 
2006
43 Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa.
An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006; 2006-07-09 - 2006-07-09
NTNU Untitled
 
44 Gjøsteen, Kristian.
A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS) 2006 ;Volum 3860. s. 150-158
NTNU Untitled
 
2005
45 Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr.
Spreading Alerts Quietly and the Subgroup Escape Problem. AsiaCrypt 2005; 2005-12-04 - 2005-12-08
NTNU Untitled
 
46 Gjøsteen, Kristian.
En PRF med en nyttig gruppestruktur. Norsk Kryptoseminar 2005; 2005-11-07 - 2005-11-08
NTNU Untitled
 
47 Gjøsteen, Kristian.
Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS) 2005 ;Volum 3715. s. 314-327
NTNU Untitled
 
48 Gjøsteen, Kristian.
Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005; 2005-09-28 - 2005-09-30
NTNU Untitled
 
49 Gjøsteen, Kristian.
Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS) 2005 ;Volum 3679. s. 455-474
NTNU Untitled
 
50 Gjøsteen, Kristian.
Security Notions for Disk Encryption. ESORICS 2005; 2005-09-12 - 2005-09-14
NTNU Untitled
 
    Vis neste liste