2020
|
1. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12170 LNCS. s. 464-493 NTNU
Untitled
|
|
2. |
Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12248 LNCS. s. 82-101 NTNU
Untitled
|
|
3. |
Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Ryan, Peter Y. A.. Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS) 2020 NTNU
Untitled
|
|
4. |
Strand, Martin; Gjøsteen, Kristian. Can there be efficient and natural FHE schemes?. CFAIL 2020: Conference for failed attempts and insightful losses; 2020-08-15 - 2020-08-15 FFI NTNU
Untitled
|
|
5. |
wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains; 2020-07-20 - 2020-07-21 NTNU
Untitled
|
2019
|
6. |
Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11898. s. 250-270 NTNU
Untitled
|
|
7. |
Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11694 LNCS. s. 767-797 NTNU
Untitled
|
2018
|
8. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11060 LNCS. s. 268-285 NTNU
Untitled
|
|
9. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Definitions for Plaintext-Existence Hiding in Cloud Storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5. NTNU UiB
Untitled
|
|
10. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11192 LNCS. s. 347-365 NTNU UiB
Untitled
|
|
11. |
Gjøsteen, Kristian; Jager, Tibor. Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10992 LNCS. s. 95-125 NTNU
Untitled
|
|
12. |
Strand, Martin. Fully homomorphic encryption with applications to electronic voting. Trondheim: Norges teknisk-naturvitenskaplige universitet 2018 (ISBN 978-82-326-2864-3) 185 s. Doktoravhandlinger ved NTNU(33) NTNU
Untitled
|
2017
|
13. |
Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06 NTNU UiB
Untitled
|
|
14. |
Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. s. 266-274 NTNU UiB
Untitled
|
|
15. |
Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16 NTNU UiB
Untitled
|
|
16. |
Galteland, Herman; Gjøsteen, Kristian. Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10311. s. 233-251 NTNU
Untitled
|
|
17. |
Gjøsteen, Kristian; Strand, Martin. A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. I: Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer 2017 ISBN 978-3-319-70277-3. s. 404-418 NTNU
Untitled
|
2016
|
18. |
Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18 NTNU UiB
Untitled
|
|
19. |
Galteland, Herman; Gjøsteen, Kristian. Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016; 2016-12-01 - 2016-12-02 NTNU
Untitled
|
|
20. |
Gjøsteen, Kristian; Lund, Anders Smedstuen. An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications 2016 NTNU
Untitled
|
2014
|
21. |
Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology 2014 ;Volum 28.(4) s. 796-819 NTNU
Untitled
|
2012
|
22. |
Gjøsteen, Kristian; Thuen, Øystein Øvreås. Password-Based Signatures. I: Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Springer 2012 ISBN 978-3-642-29803-5. s. 17-33 NTNU
Untitled
|
2011
|
23. |
Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS) 2011 ;Volum 6980. s. 340-347 NTNU
Untitled
|
|
24. |
Gjøsteen, Kristian; Thuen, Øystein Øvreås. Password-Based Signatures. EuroPKI 2011; 2011-09-15 - 2011-09-16 NTNU
Untitled
|
|
25. |
Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. Farene ved e-valg. Dagbladet 2011 NTNU UiB
Untitled
|
|
26. |
Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen. A Novel Framework for Protocol Analysis. Provable Security; 2011-10-16 - 2011-10-18 NTNU
Untitled
|
|
27. |
Thuen, Øystein Øvreås. Bilinear Pairings in Cryptography. : NTNU 2011 (ISBN 978-82-471-2828-2) 132 s. Doktoravhandlinger ved NTNU(143) NTNU
Untitled
|
2010
|
28. |
Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010; 2010-11-23 - 2010-11-24 NTNU
Untitled
|
|
29. |
Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. Formal verification of reductions in cryptography. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. s. 21-32 NTNU
Untitled
|
2008
|
30. |
Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. A framework for compositional verification of security protocols. Information and Computation 2008 ;Volum 206.(2-4) s. 425-459 NTNU
Untitled
|
|
31. |
Gjøsteen, Kristian. A Latency-Free Election Scheme. RSA Conference 208; 2008-04-07 - 2008-04-11 NTNU
Untitled
|
|
32. |
Gjøsteen, Kristian. A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 4964. s. 425-436 NTNU
Untitled
|
|
33. |
Gjøsteen, Kristian. Hvordan knekke nettbanken?. The Gathering 2008; 2008-03-19 - 2008-03-23 NTNU
Untitled
|
|
34. |
Gjøsteen, Kristian. Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008; 2008-06-16 - 2008-06-17 NTNU
Untitled
|
|
35. |
Gjøsteen, Kristian. Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 5057. s. 196-206 NTNU
Untitled
|
|
36. |
Gjøsteen, Kristian; Kråkmo, Lillian. Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 5324. s. 112-126 NTNU
Untitled
|
|
37. |
Gjøsteen, Kristian; Kråkmo, Lillian. Round-Optimal Blind Signatures from Waters Signatures. Provable Security; 2008-10-30 - 2008-11-01 NTNU
Untitled
|
2007
|
38. |
Brown, Daniel R. L.; Gjøsteen, Kristian. A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007; 2007-08-19 - 2007-08-23 NTNU
Untitled
|
|
39. |
Brown, Daniel R. L.; Gjøsteen, Kristian. A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS) 2007 ;Volum 4622. s. 466-481 NTNU
Untitled
|
|
40. |
Gjøsteen, Kristian. Kryptografi og Minside. Vitenskapskafe; 2007-01-25 - 2007-01-25 NTNU
Untitled
|
|
41. |
Gjøsteen, Kristian; Hole, Kjell Jørgen. Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.) 2007 NTNU UiB
Untitled
|
|
42. |
Gjøsteen, Kristian; Kråkmo, Lillian. Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS) 2007 ;Volum 4582. s. 346-353 NTNU
Untitled
|
2006
|
43. |
Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa. An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006; 2006-07-09 - 2006-07-09 NTNU
Untitled
|
|
44. |
Gjøsteen, Kristian. A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS) 2006 ;Volum 3860. s. 150-158 NTNU
Untitled
|
2005
|
45. |
Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. Spreading Alerts Quietly and the Subgroup Escape Problem. AsiaCrypt 2005; 2005-12-04 - 2005-12-08 NTNU
Untitled
|
|
46. |
Gjøsteen, Kristian. En PRF med en nyttig gruppestruktur. Norsk Kryptoseminar 2005; 2005-11-07 - 2005-11-08 NTNU
Untitled
|
|
47. |
Gjøsteen, Kristian. Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS) 2005 ;Volum 3715. s. 314-327 NTNU
Untitled
|
|
48. |
Gjøsteen, Kristian. Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005; 2005-09-28 - 2005-09-30 NTNU
Untitled
|
|
49. |
Gjøsteen, Kristian. Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS) 2005 ;Volum 3679. s. 455-474 NTNU
Untitled
|
|
50. |
Gjøsteen, Kristian. Security Notions for Disk Encryption. ESORICS 2005; 2005-09-12 - 2005-09-14 NTNU
Untitled
|