Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-41 av 41

2017
1 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06
NTNU UiB Untitled
 
2 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science 2017 s. 233-251
NTNU Untitled
 
2016
3 Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18
NTNU UiB Untitled
 
4 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016; 2016-12-01 - 2016-12-02
NTNU Untitled
 
5 Gjøsteen, Kristian; Lund, Anders Smedstuen.
An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications 2016
NTNU Untitled
 
2014
6 Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René.
Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology 2014 ;Volum 28.(4) s. 796-819
NTNU Untitled
 
2012
7 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. I: Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Springer 2012 ISBN 978-3-642-29803-5. s. 17-33
NTNU Untitled
 
2011
8 Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science 2011 ;Volum 6980. s. 340-347
NTNU Untitled
 
9 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. EuroPKI 2011; 2011-09-15 - 2011-09-16
NTNU Untitled
 
10 Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland.
Farene ved e-valg. Dagbladet 2011
NTNU UiB Untitled
 
11 Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Provable Security; 2011-10-16 - 2011-10-18
NTNU Untitled
 
12 Thuen, Øystein Øvreås.
Bilinear Pairings in Cryptography. : NTNU 2011 (ISBN 978-82-471-2828-2) 132 s. Doktoravhandlinger ved NTNU(143)
NTNU Untitled
 
2010
13 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010; 2010-11-23 - 2010-11-24
NTNU Untitled
 
14 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. s. 21-32
NTNU Untitled
 
2008
15 Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa.
A framework for compositional verification of security protocols. Information and Computation 2008 ;Volum 206.(2-4) s. 425-459
NTNU Untitled
 
16 Gjøsteen, Kristian.
A Latency-Free Election Scheme. RSA Conference 208; 2008-04-07 - 2008-04-11
NTNU Untitled
 
17 Gjøsteen, Kristian.
A Latency-Free Election Scheme. Lecture Notes in Computer Science 2008 ;Volum 4964. s. 425-436
NTNU Untitled
 
18 Gjøsteen, Kristian.
Hvordan knekke nettbanken?. The Gathering 2008; 2008-03-19 - 2008-03-23
NTNU Untitled
 
19 Gjøsteen, Kristian.
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science 2008 ;Volum 5057. s. 196-206
NTNU Untitled
 
20 Gjøsteen, Kristian.
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008; 2008-06-16 - 2008-06-17
NTNU Untitled
 
21 Gjøsteen, Kristian; Kråkmo, Lillian.
Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science 2008 ;Volum 5324. s. 112-126
NTNU Untitled
 
22 Gjøsteen, Kristian; Kråkmo, Lillian.
Round-Optimal Blind Signatures from Waters Signatures. Provable Security; 2008-10-30 - 2008-11-01
NTNU Untitled
 
2007
23 Brown, Daniel R. L.; Gjøsteen, Kristian.
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007; 2007-08-19 - 2007-08-23
NTNU Untitled
 
24 Brown, Daniel R. L.; Gjøsteen, Kristian.
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science 2007 ;Volum 4622. s. 466-481
NTNU Untitled
 
25 Gjøsteen, Kristian.
Kryptografi og Minside. Vitenskapskafe; 2007-01-25 - 2007-01-25
NTNU Untitled
 
26 Gjøsteen, Kristian; Hole, Kjell Jørgen.
Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.) 2007
NTNU UiB Untitled
 
27 Gjøsteen, Kristian; Kråkmo, Lillian.
Universally Composable Signcryption. Lecture Notes in Computer Science 2007 ;Volum 4582. s. 346-353
NTNU Untitled
 
2006
28 Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa.
An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006; 2006-07-09 - 2006-07-09
NTNU Untitled
 
29 Gjøsteen, Kristian.
A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science 2006 ;Volum 3860. s. 150-158
NTNU Untitled
 
2005
30 Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr.
Spreading Alerts Quietly and the Subgroup Escape Problem. AsiaCrypt 2005; 2005-12-04 - 2005-12-08
NTNU Untitled
 
31 Gjøsteen, Kristian.
En PRF med en nyttig gruppestruktur. Norsk Kryptoseminar 2005; 2005-11-07 - 2005-11-08
NTNU Untitled
 
32 Gjøsteen, Kristian.
Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science 2005 ;Volum 3715. s. 314-327
NTNU Untitled
 
33 Gjøsteen, Kristian.
Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005; 2005-09-28 - 2005-09-30
NTNU Untitled
 
34 Gjøsteen, Kristian.
Security Notions for Disk Encryption. ESORICS 2005; 2005-09-12 - 2005-09-14
NTNU Untitled
 
35 Gjøsteen, Kristian.
Security Notions for Disk Encryption. Lecture Notes in Computer Science 2005 ;Volum 3679. s. 455-474
NTNU Untitled
 
36 Gjøsteen, Kristian.
Symmetric Subgroup Membership Problems. 8th International Workshop on Practice and Theory in Public Key Cryptography; 2005-01-23 - 2005-01-26
NTNU Untitled
 
37 Gjøsteen, Kristian; Årnes, André.
Intervju om kryptografi, Her og nå, NRK P1. NRK P1 [Radio] 2005-08-17
NTNU Untitled
 
38 Gjøsteen, Kristian; Årnes, André.
Kriminelt kryptisk. Gemini [Avis] 2005-06-01
NTNU Untitled
 
39 Willassen, Svein Yngvar; Gjøsteen, Kristian.
Kriminelle bruker hemmelige koder. Nettavisen [Internett] 2005-06-14
NTNU Untitled
 
40 Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr.
Spreading Alerts Quietly and the Subgroup Escape Problem. Lecture Notes in Computer Science 2005 ;Volum 3788. s. 253-272
NTNU Untitled
 
41 Gjøsteen, Kristian.
Symmetric Subgroup Membership Problems. Lecture Notes in Computer Science 2005 ;Volum 3386. s. 104-119
NTNU Untitled