Current Research Information SysTem In Norway
 
 

 English version


 
Hovedside
Forskningsresultater/NVI
Forskere
Prosjekter
Forskningsenheter
Logg inn
Om Cristin
 
 
   
Eksporter til


Viser treff 1-50 av 53 << Forrige 1 2    Neste >>

2020
1 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12170 LNCS. s. 464-493
NTNU Untitled
 
2 Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao.
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12248 LNCS. s. 82-101
NTNU Untitled
 
2019
3 Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund.
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11898. s. 250-270
NTNU Untitled
 
4 Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor.
Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11694 LNCS. s. 767-797
NTNU Untitled
 
2018
5 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao.
Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11060 LNCS. s. 268-285
NTNU Untitled
 
6 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Definitions for Plaintext-Existence Hiding in Cloud Storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5.
NTNU UiB Untitled
 
7 Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11192 LNCS. s. 347-365
NTNU UiB Untitled
 
8 Gjøsteen, Kristian; Jager, Tibor.
Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10992 LNCS. s. 95-125
NTNU Untitled
 
9 Strand, Martin.
Fully homomorphic encryption with applications to electronic voting. Trondheim: Norges teknisk-naturvitenskaplige universitet 2018 (ISBN 978-82-326-2864-3) 185 s. Doktoravhandlinger ved NTNU(33)
NTNU Untitled
 
2017
10 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06
NTNU UiB Untitled
 
11 Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen.
Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. s. 266-274
NTNU UiB Untitled
 
12 Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16
NTNU UiB Untitled
 
13 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10311. s. 233-251
NTNU Untitled
 
14 Gjøsteen, Kristian; Strand, Martin.
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. I: Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer 2017 ISBN 978-3-319-70277-3. s. 404-418
NTNU Untitled
 
2016
15 Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen.
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18
NTNU UiB Untitled
 
16 Galteland, Herman; Gjøsteen, Kristian.
Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016; 2016-12-01 - 2016-12-02
NTNU Untitled
 
17 Gjøsteen, Kristian; Lund, Anders Smedstuen.
An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications 2016
NTNU Untitled
 
2014
18 Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René.
Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology 2014 ;Volum 28.(4) s. 796-819
NTNU Untitled
 
2012
19 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. I: Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Springer 2012 ISBN 978-3-642-29803-5. s. 17-33
NTNU Untitled
 
2011
20 Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS) 2011 ;Volum 6980. s. 340-347
NTNU Untitled
 
21 Gjøsteen, Kristian; Thuen, Øystein Øvreås.
Password-Based Signatures. EuroPKI 2011; 2011-09-15 - 2011-09-16
NTNU Untitled
 
22 Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland.
Farene ved e-valg. Dagbladet 2011
NTNU UiB Untitled
 
23 Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen.
A Novel Framework for Protocol Analysis. Provable Security; 2011-10-16 - 2011-10-18
NTNU Untitled
 
24 Thuen, Øystein Øvreås.
Bilinear Pairings in Cryptography. : NTNU 2011 (ISBN 978-82-471-2828-2) 132 s. Doktoravhandlinger ved NTNU(143)
NTNU Untitled
 
2010
25 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010; 2010-11-23 - 2010-11-24
NTNU Untitled
 
26 Gjøsteen, Kristian; Steine, Asgeir; Petrides, George.
Formal verification of reductions in cryptography. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. s. 21-32
NTNU Untitled
 
2008
27 Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa.
A framework for compositional verification of security protocols. Information and Computation 2008 ;Volum 206.(2-4) s. 425-459
NTNU Untitled
 
28 Gjøsteen, Kristian.
A Latency-Free Election Scheme. RSA Conference 208; 2008-04-07 - 2008-04-11
NTNU Untitled
 
29 Gjøsteen, Kristian.
A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 4964. s. 425-436
NTNU Untitled
 
30 Gjøsteen, Kristian.
Hvordan knekke nettbanken?. The Gathering 2008; 2008-03-19 - 2008-03-23
NTNU Untitled
 
31 Gjøsteen, Kristian.
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008; 2008-06-16 - 2008-06-17
NTNU Untitled
 
32 Gjøsteen, Kristian.
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 5057. s. 196-206
NTNU Untitled
 
33 Gjøsteen, Kristian; Kråkmo, Lillian.
Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 5324. s. 112-126
NTNU Untitled
 
34 Gjøsteen, Kristian; Kråkmo, Lillian.
Round-Optimal Blind Signatures from Waters Signatures. Provable Security; 2008-10-30 - 2008-11-01
NTNU Untitled
 
2007
35 Brown, Daniel R. L.; Gjøsteen, Kristian.
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007; 2007-08-19 - 2007-08-23
NTNU Untitled
 
36 Brown, Daniel R. L.; Gjøsteen, Kristian.
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS) 2007 ;Volum 4622. s. 466-481
NTNU Untitled
 
37 Gjøsteen, Kristian.
Kryptografi og Minside. Vitenskapskafe; 2007-01-25 - 2007-01-25
NTNU Untitled
 
38 Gjøsteen, Kristian; Hole, Kjell Jørgen.
Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.) 2007
NTNU UiB Untitled
 
39 Gjøsteen, Kristian; Kråkmo, Lillian.
Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS) 2007 ;Volum 4582. s. 346-353
NTNU Untitled
 
2006
40 Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa.
An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006; 2006-07-09 - 2006-07-09
NTNU Untitled
 
41 Gjøsteen, Kristian.
A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS) 2006 ;Volum 3860. s. 150-158
NTNU Untitled
 
2005
42 Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr.
Spreading Alerts Quietly and the Subgroup Escape Problem. AsiaCrypt 2005; 2005-12-04 - 2005-12-08
NTNU Untitled
 
43 Gjøsteen, Kristian.
En PRF med en nyttig gruppestruktur. Norsk Kryptoseminar 2005; 2005-11-07 - 2005-11-08
NTNU Untitled
 
44 Gjøsteen, Kristian.
Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS) 2005 ;Volum 3715. s. 314-327
NTNU Untitled
 
45 Gjøsteen, Kristian.
Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005; 2005-09-28 - 2005-09-30
NTNU Untitled
 
46 Gjøsteen, Kristian.
Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS) 2005 ;Volum 3679. s. 455-474
NTNU Untitled
 
47 Gjøsteen, Kristian.
Security Notions for Disk Encryption. ESORICS 2005; 2005-09-12 - 2005-09-14
NTNU Untitled
 
48 Gjøsteen, Kristian.
Symmetric Subgroup Membership Problems. 8th International Workshop on Practice and Theory in Public Key Cryptography; 2005-01-23 - 2005-01-26
NTNU Untitled
 
49 Gjøsteen, Kristian; Årnes, André.
Intervju om kryptografi, Her og nå, NRK P1. NRK P1 [Radio] 2005-08-17
NTNU Untitled
 
50 Gjøsteen, Kristian; Årnes, André.
Kriminelt kryptisk. Gemini [Avis] 2005-06-01
NTNU Untitled
 
    Vis neste liste