|
|
English
version
For å registrere i Cristin må du være vitenskapelig eller administrativt ansatt.
|
|
|
|
|
|
|
|
|
Viser treff 1-50 av 73
|
<< Forrige
1
2
Neste >>
|
2024
|
1. |
Solberg, Morten Rotvold; Gjøsteen, Kristian; Haines, Thomas; Dragan, Constantin Catalin; Dupressoir, François; Rønne, Peter B.. Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. I: Computer Security - ESORICS 2023. Springer 2024 ISBN 978-3-031-51478-4. s. 471-491 NTNU
Untitled
|
2023
|
2. |
Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand Aga. Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. Proceedings of the ACM Conference on Computer and Communications Security 2023 s. 1467-1481 NTNU
Untitled
|
|
3. |
Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise. Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS) 2023 ;Volum 14411. s. 455-472 NTNU
Untitled
|
|
4. |
Gellert, Kai; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. Lecture Notes in Computer Science (LNCS) 2023 ;Volum 14084. s. 297-329 NTNU UiO
Untitled
|
|
5. |
Gjøsteen, Kristian; Haines, Thomas; Solberg, Morten Rotvold. Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. I: Electronic Voting. Springer 2023 ISBN 978-3-031-43755-7. s. 69-86 NTNU
Untitled
|
|
6. |
Raikwar, Mayank; Wu, Shuang; Gjøsteen, Kristian. Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. I: Network and System Security 17th International Conference, NSS 2023 Canterbury, UK, August 14–16, 2023 Proceedings. Springer 2023 ISBN 978-3-031-39828-5. s. 137-154 UiO NTNU
Untitled
|
|
7. |
Solberg, Morten Rotvold; Gjøsteen, Kristian. Automated theorem provers and their role in cryptography. NTNU
Untitled
|
2022
|
8. |
Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.; Rønne, Peter B.; Solberg, Morten Rotvold. Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. I: 2022 IEEE 35th Computer Security Foundations Symposium (CSF). IEEE Press 2022 ISBN 978-1-6654-8417-6. s. 319-331 NTNU
Untitled
|
|
9. |
Gjøsteen, Kristian. Practical Mathematical Cryptography. CRC Press 2022 (ISBN 9780367710859) 546 s. NTNU
Untitled
|
|
10. |
Gjøsteen, Kristian; Fuchs, Franz Georg; Engesvik, Sara. Kvantedatamaskiners destruktive potensiale: – Vi må forsikre oss mot at verden ramler sammen. https://www.digi.no/artikler/kvantedatamaskiners-destruktive [Internett] 2022-08-05 SINTEF NTNU
Untitled
|
|
11. |
Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand. Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS) 2022 ;Volum 13494. s. 355-374 NTNU
Untitled
|
|
12. |
Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang. PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. I: Topics in Cryptology – CT-RSA 2022. Virtual Event: Springer Cham 2022 ISBN 978-3-030-95312-6. s. 589-619 NTNU
Untitled
|
2021
|
13. |
Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor. Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS) 2021 ;Volum 12704. s. 227-251 NTNU
Untitled
|
|
14. |
de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia. Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2021 ;Volum 12804. s. 451-479 NTNU
Untitled
|
|
15. |
Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold. Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS) 2021 ;Volum 12556. s. 92-107 NTNU
Untitled
|
2020
|
16. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12170 LNCS. s. 464-493 NTNU
Untitled
|
|
17. |
Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12248 LNCS. s. 82-101 NTNU
Untitled
|
|
18. |
Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh. Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 12455. s. 50-66 NTNU
Untitled
|
|
19. |
Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A.. Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS) 2020 ;Volum 11599. s. 289-298 NTNU
Untitled
|
|
20. |
Strand, Martin; Gjøsteen, Kristian. Can there be efficient and natural FHE schemes?. CFAIL 2020: Conference for failed attempts and insightful losses; 2020-08-15 - 2020-08-15 FFI NTNU
Untitled
|
|
21. |
wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains; 2020-07-20 - 2020-07-21 NTNU
Untitled
|
2019
|
22. |
Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11898. s. 250-270 NTNU
Untitled
|
|
23. |
Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2019 ;Volum 11694 LNCS. s. 767-797 NTNU
Untitled
|
|
24. |
Cremers, Cas; Gjøsteen, Kristian; Jager, Tibor; Cohn-Gordon, Katriel. Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS) 2019 NTNU
Untitled
|
2018
|
25. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11060 LNCS. s. 268-285 NTNU
Untitled
|
|
26. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Definitions for plaintext-existence hiding in cloud storage. I: ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018. Association for Computing Machinery (ACM) 2018 ISBN 978-1-4503-6448-5. UiB NTNU
Untitled
|
|
27. |
Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 11192 LNCS. s. 347-365 UiB NTNU
Untitled
|
|
28. |
Gjøsteen, Kristian; Jager, Tibor. Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS) 2018 ;Volum 10992 LNCS. s. 95-125 NTNU
Untitled
|
|
29. |
Strand, Martin. Fully homomorphic encryption with applications to electronic voting. Trondheim: Norges teknisk-naturvitenskaplige universitet 2018 (ISBN 978-82-326-2864-3) 185 s. Doktoravhandlinger ved NTNU(33) NTNU
Untitled
|
2017
|
30. |
Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17); 2017-04-02 - 2017-04-06 NTNU UiB
Untitled
|
|
31. |
Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. Side channels in deduplication: trade-offs between leakage and efficiency. I: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM) 2017 ISBN 978-1-4503-4944-4. s. 266-274 NTNU UiB
Untitled
|
|
32. |
Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity; 2017-11-16 NTNU UiB
Untitled
|
|
33. |
Galteland, Herman; Gjøsteen, Kristian. Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10311. s. 233-251 NTNU
Untitled
|
|
34. |
Gjøsteen, Kristian; Strand, Martin. A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. I: Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer 2017 ISBN 978-3-319-70277-3. s. 404-418 NTNU
Untitled
|
2016
|
35. |
Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. Using Cryptography to Control Your Data at a Distance. ERCIM News 2016 ;Volum 106. s. 17-18 UiB NTNU
Untitled
|
|
36. |
Galteland, Herman; Gjøsteen, Kristian. Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016; 2016-12-01 - 2016-12-02 NTNU
Untitled
|
|
37. |
Gjøsteen, Kristian; Lund, Anders Smedstuen. An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications 2016 NTNU
Untitled
|
2014
|
38. |
Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology 2014 ;Volum 28.(4) s. 796-819 NTNU
Untitled
|
2012
|
39. |
Gjøsteen, Kristian; Thuen, Øystein Øvreås. Password-Based Signatures. I: Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers. Springer 2012 ISBN 978-3-642-29803-5. s. 17-33 NTNU
Untitled
|
2011
|
40. |
Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS) 2011 ;Volum 6980. s. 340-347 NTNU
Untitled
|
|
41. |
Gjøsteen, Kristian; Thuen, Øystein Øvreås. Password-Based Signatures. EuroPKI 2011; 2011-09-15 - 2011-09-16 NTNU
Untitled
|
|
42. |
Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. Farene ved e-valg. Dagbladet 2011 UiB NTNU
Untitled
|
|
43. |
Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen. A Novel Framework for Protocol Analysis. Provable Security; 2011-10-16 - 2011-10-18 NTNU
Untitled
|
|
44. |
Thuen, Øystein Øvreås. Bilinear Pairings in Cryptography. : NTNU 2011 (ISBN 978-82-471-2828-2) 132 s. Doktoravhandlinger ved NTNU(143) NTNU
Untitled
|
2010
|
45. |
Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010; 2010-11-23 - 2010-11-24 NTNU
Untitled
|
|
46. |
Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. Formal verification of reductions in cryptography. I: Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010. Tapir Akademisk Forlag 2010 ISBN 978-82-519-2705-5. s. 21-32 NTNU
Untitled
|
2008
|
47. |
Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. A framework for compositional verification of security protocols. Information and Computation 2008 ;Volum 206.(2-4) s. 425-459 NTNU
Untitled
|
|
48. |
Gjøsteen, Kristian. A Latency-Free Election Scheme. RSA Conference 208; 2008-04-07 - 2008-04-11 NTNU
Untitled
|
|
49. |
Gjøsteen, Kristian. A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS) 2008 ;Volum 4964. s. 425-436 NTNU
Untitled
|
|
50. |
Gjøsteen, Kristian. Hvordan knekke nettbanken?. The Gathering 2008; 2008-03-19 - 2008-03-23 NTNU
Untitled
|
Vis neste liste
|