2020
|
1. |
Nätt, Tom Heine; Knapskog, Svein Johan. Løk-ruting. Store Norske Leksikon (Nettutgaven) 2020 HIOF
Untitled
|
2019
|
2. |
Nätt, Tom Heine; Knapskog, Svein Johan. Autentisering. Store Norske Leksikon (Nettutgaven) 2019 HIOF
Untitled
|
2013
|
3. |
Chen, Yanling; Gligoroski, Danilo; Knapskog, Svein Johan. On a special class of multivariate quadratic quasigroups (MQQs). Journal of Mathematical Cryptology 2013 ;Volum 7.(2) s. 111-141 NTNU
Untitled
|
2012
|
4. |
Aly, Mohamed Ezzat El Hadedy. Implementing Algorithms on FPGA Platforms. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3332-3) 177 s. NTNU
Untitled
|
|
5. |
Chia, Pern Hui. Information Security on the Web and App Platforms - An Economic and Socio-Behavioral Perspective. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3969-1) 165 s. NTNU
Untitled
|
|
6. |
Chia, Pern Hui. Information Security on the Web and App Platforms: An Economic and Socio-Behavioral Perspective. Trondheim: NTNU 2012 (ISBN 978-82-471-3969-1) 177 s. Doktoravhandlinger ved NTNU(324) NTNU
Untitled
|
|
7. |
Chia, Pern Hui; Knapskog, Svein Johan. Re-evaluating the Wisdom of Crowds in Assessing Web Security. Lecture Notes in Computer Science (LNCS) 2012 ;Volum 7035. s. 299-314 NTNU
Untitled
|
|
8. |
Gligoroski, Danilo; Knapskog, Svein Johan; Amundsen, Jørn; Jensen, Rune Erlend. Internationally Standardized Efficient Cryptographic Hash Function. ICT Innovations 2012 - "Secure and Intelligent Systems"; 2012-09-12 - 2012-09-15 NTNU
Untitled
|
|
9. |
Knapskog, Svein Johan. Kryptografi - Grunnleggende teknikk for sikring av informasjon. Carl Schulz's festmøte; 2012-11-14 - 2012-11-14 NTNU
Untitled
|
|
10. |
Knapskog, Svein Johan. Kryptografi Grunnleggende teknikk for sikring av informasjon. Tekna Kursdagene 2012; 2012-01-05 - 2012-01-06 NTNU
Untitled
|
|
11. |
Knapskog, Svein Johan. Rekruttering og personalpolitikk i praksis. NAV Eures årsmøte 2012; 2012-04-26 - 2012-04-26 NTNU
Untitled
|
|
12. |
Tavakolifard, Mozhgan. On Some Challenges for Online Trust and Reputation Systems. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3535-8) ;Volum 2012.215 s. Doktoravhandlinger ved NTNU(127) NTNU
Untitled
|
|
13. |
Westermann, Benedikt. Challenges of Anonymous Communication; Bridging Gaps Between Theory and Practice. Tapir Akademisk Forlag 2012 (ISBN 978-82471-3301-9) 166 s. NTNU
Untitled
|
|
14. |
Ødegård, Rune Steinsmo. Hash Functions and Gröbner Bases Cryptanalysis. Tapir Akademisk Forlag 2012 (ISBN 978-82-471-3501-3) 234 s. NTNU
Untitled
|
2011
|
15. |
Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan. Area Efficient Processing Element Architecture for Compact Hash Functions Systems on VIRTEX5 FPGA Platform. I: Adaptive Hardware and Systems (AHS), 2011 NASA/ESA. IEEE 2011 ISBN 978-1-4577-0598-4. s. 240-247 NTNU
Untitled
|
|
16. |
Aly, Mohammed Ezzat El-Hadedy; Pitsilis, Georgios; Knapskog, Svein Johan. An Efficient Authorship Protection Scheme for Shared Multimedia Content. I: Proceedings of the Sixth International Conference on Image and Graphics. IEEE 2011 ISBN 978-0-7695-4541-7. s. 914-919 NTNU
Untitled
|
|
17. |
Chen, Yanling; Gligoroski, Danilo; Knapskog, Svein Johan. A standard form of the MQQ generating function and its applications. Loops' 11; 2011-07-21 - 2011-07-27 NTNU
Untitled
|
|
18. |
Chen, Yanling; Vinck, A. J. Han; Gligoroski, Danilo; Knapskog, Svein Johan. An overview of the information-theoretic perspective on biometric systems. I: Norsk informasjonssikkerhetskonferanse, NISK 2011. Tapir Akademisk Forlag 2011 ISBN 978-82-519-28472. s. 31-42 NTNU
Untitled
|
|
19. |
Gligoroski, Danilo; Knapskog, Svein Johan; Amundsen, Jørn Aslak; Jensen, Rune Erlend. Internationally Standardized Efficient Cryptographic Hash Function. SECRYPT 2011; 2011-07-18 - 2011-07-21 NTNU
Untitled
|
|
20. |
Gligoroski, Danilo; Knapskog, Svein Johan; Amundsen, Jørn Aslak; Jensen, Rune Erlend. Internationally Standardized Efficient Cryptographic Hash Function. I: SECRYPT 2011 International Conference on Security and Cryptography - Proceedings. SciTePress 2011 ISBN 978-989-8425-71-3. s. 426-433 NTNU
Untitled
|
|
21. |
Gligoroski, Danilo; Knapskog, Svein Johan; Samardjiska, Simona. The Need for Parallel Ultra Fast Cryptographic Designs for Emerging Technologies. NIST Workshop on Cryptography for Emerging Technologies and Applications; 2011-11-07 - 2011-11-08 NTNU
Untitled
|
|
22. |
Gligoroski, Danilo; Ødegård, Rune Steinsmo; Jensen, Rune Erlend; Perret, Ludovic; Faugère, Jean-Charles; Knapskog, Svein Johan; Markovski, Smile. MQQ-SIG, An Ultra-fast and Provably CMA Resistant Digital Signature Scheme. INTRUST 2011 : The Third International Conference on Trusted Systems; 2011-11-27 - 2011-11-29 NTNU
Untitled
|
|
23. |
Knapskog, Svein Johan. ICT Security Evaluation. I: A Multidisciplinary Introduction to Information Security. CRC Press 2011 ISBN 978-1-4200-8590-7. s. 217-240 NTNU
Untitled
|
|
24. |
Tavakolifard, Mozhgan; Knapskog, Svein Johan. Trust Evaluation Initialization Using Contextual Information. The International Conference on Management of Emergent Digital EcoSystems (MEDES); 2011-11-21 - 2011-11-24 NTNU
Untitled
|
|
25. |
Tavakolifard, Mozhgan; Knapskog, Svein Johan. Trust Evaluation Initialization Using Contextual Information. I: Proceeding of the International Conference on Management of Emergent Digital EcoSystems (MEDES'11). ACM Publications 2011 ISBN 978-1-4503-1047-5. NTNU
Untitled
|
|
26. |
Westermann, Benedikt; Gligoroski, Danilo; Knapskog, Svein Johan. Comparison of the Power Consumption of the 2nd Round SHA-3 Candidates. I: ICT Innovations 2010, CCIS Vol 83. Springer 2011 ISBN 978-3-642-19324-8. s. 102-113 NTNU
Untitled
|
2010
|
27. |
Aagesen, Finn Arve; Knapskog, Svein Johan. Networked Services and Applications - Engineering, Control and Management. Springer 2010 (ISBN 978-3-642-13970-3) 273 s. Lecture Notes in Computer Science(6164) NTNU
Untitled
|
|
28. |
Aagesen, Finn Arve; Knapskog, Svein Johan. Networked services and applications : 16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010 : proceedings. Springer 2010 (ISBN 978-3-642-13970-3) 273 s. Lecture Notes in Computer Science(6164) NTNU
Untitled
|
|
29. |
Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan. Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform. : eprints@USM 2010 1500 s. NTNU
Untitled
|
|
30. |
Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan; Margala, Martin. Compact Implementation of BLUE MIDNIGHT WISH-256 Hash Function on Xilinx FPGA Platform. Journal of Information Assurance and Security 2010 ;Volum 5. s. 626-636 NTNU
Untitled
|
|
31. |
Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan. Implementing The Blue Midnight Wish Hash Function on Xilinx Virtex-5 FPGA Platform. I: 2010 International Conference on ReConFigurable Computing and FPGAs. IEEE 2010 ISBN 9780769543147. s. 394-399 NTNU
Untitled
|
|
32. |
Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan. Implementing The Blue MidnightWish Hash Function on Xilinx Virtex-5 FPGA Platform. International Conference on Reconfigurable Computing and FPGAs, ReConFig10; 2010-12-13 - 2010-12-15 NTNU
Untitled
|
|
33. |
Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan. Resource-efficient implementation of Blue Midnight Wish-256 hash function on Xilinx FPGA platform. I: 2010 Sixth International Symposium on Information Assurance and Security (IAS). IEEE conference proceedings 2010 ISBN 978-1-4244-7408-0. s. 44-47 NTNU
Untitled
|
|
34. |
Aly, Mohamed Ezzat El Hadedy; Margala, Martin; Gligoroski, Danilo; Knapskog, Svein Johan. Resource-Efficient Implementation of the Blue Midnight Wish-256 Hash Function on Xilinx FPGA Platform. Information Assurance and Security (IAS), 2010 Sixth International Conference; 2010-08-23 - 2010-08-25 NTNU
Untitled
|
|
35. |
Aly, Mohamed Ezzat El Hadedy; Purohit, Sohan; Margala, Martin; Knapskog, Svein Johan. Low Latency Transpose Memory for High Throughput Signal Processing. The 8th edition of the International Conference NEWCAS; 2010-06-20 - 2010-06-23 NTNU
Untitled
|
|
36. |
Aly, Mohamed Ezzat El Hadedy; Purohit, Sohan; Margala, Martin; Knapskog, Svein Johan. Performance and area efficient transpose memory architecture for high throughput adaptive signal processing systems. Adaptive Hardware and Systems (AHS), 2010 NASA/ESA; 2010-06-15 - 2010-06-18 NTNU
Untitled
|
|
37. |
El-Hadedy, Mohamed; purohit, sohan; margala, Martin; Knapskog, Svein Johan. Low Latency Transpose Memory for High Throughput Signal Processing. I: 8th IEEE International NEWCAS conference. IEEE 2010 ISBN 978-1-4244-6806-5. NTNU
Untitled
|
|
38. |
Gladysh, Sergiy; Herrmann, Peter Michael; Knapskog, Svein Johan. User-Centered Security, Privacy and Trust in Ubiquitous Social Network Services. The VERDIKT Conference 2010; 2010-11-01 - 2010-11-02 NTNU
Untitled
|
|
39. |
Haslum, Kjetil. Real-time Network Intrusion Prevention. Tapir Akademisk Forlag 2010 (ISBN 978-82-471-2308-9) 172 s. NTNU
Untitled
|
|
40. |
Markovski, Smile; Samardjiska, Simona; Gligoroski, Danilo; Knapskog, Svein Johan. Multivariate Trapdoor Functions Based on Multivariate Left Quasigroups and Left Polynomial Quasigroups. Conference on Symbolic Computation and Cryptography; 2010-06-23 - 2010-06-25 NTNU
Untitled
|
2009
|
41. |
Pitsilis, Georgios; Knapskog, Svein Johan. Social Trust as a solution to address sparsity-inherent problems of Recommender systems. Workshop held at 3rd ACM Conference on Recommender Systems; 2009-10-25 - 2009-10-25 NTNU
Untitled
|
|
42. |
Tavakolifard, Mozhgan; Herrmann, Peter; Knapskog, Svein Johan. Inferring Trust Based on Similarity with TILLIT (presentation). IFIPTM 2009 : Third IFIP WG 11.11 International Conference on Trust Management Bookmark and Share; 2009-06-15 - 2009-06-19 NTNU
Untitled
|
|
43. |
Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan. Low Area Implementation of the Hash Function "Blue Midnight Wish – 256" for FPGA platforms. I: Proceedings of The International Conference on Intelligent Networking and Collaborative Systems. IEEE 2009 ISBN 978-0-7695-3858-7. s. 100-104 NTNU
Untitled
|
|
44. |
Aly, Mohamed Ezzat El Hadedy; Gligoroski, Danilo; Knapskog, Svein Johan; Aas, Einar Johan. Low Area FPGA and ASIC Implementations of the Hash Function “Blue Midnight Wish-256. I: Proceedings, ICCES’09, The 2009 International Conference on Computer Engineering & Systems. IEEE conference proceedings 2009 ISBN 978-1-4244-5843-1. s. 10-14 NTNU
Untitled
|
|
45. |
Gligoroski, Danilo; Markovski, Smile; Knapskog, Svein Johan. A new measure to estimate pseudo-randomness of Boolean functions and relations with Groebner bases. I: Groebner Bases, Coding, and Cryptography. Springer 2009 ISBN 978-3-540-93805-7. s. 421-426 NTNU
Untitled
|
|
46. |
Jøsang, Audun; Maseng, Torleiv; Knapskog, Svein Johan. Identity and Privacy in the Internet Age: 14th Nordic Conference on Secure IT Systems. Springer Publishing Company 2009 (ISBN 978-3-642-04765-7) 303 s. Lecture Notes in Computer Science(5838) FFI NTNU UiO
Untitled
|
|
47. |
Knapskog, Svein Johan. Cryptographic Hash Function BLUE MIDNIGHT WISH. The First SHA-3 Candidate Conference; 2009-02-25 - 2009-02-28 NTNU
Untitled
|
|
48. |
Knapskog, Svein Johan. Fra Forskningsfronten. Sikkerhet og sårbarhet 2009; 2009-05-12 - 2009-05-13 NTNU
Untitled
|
|
49. |
Knapskog, Svein Johan; Lindskog, Stefan. Proceedings of the 1st International Workshop on Security and Communication Networks. Trondheim, Norway: Norwegian University of Science and Technology 2009 (ISBN 978-82-997105-1-0) 132 s. NTNU
Untitled
|
|
50. |
Knapskog, Svein Johan; Lindskog, Stefan. 1st International Workshop on Security and Communication Networks. : IEEE Xplore 2009 (ISBN 978-82-997105-1-0) 132 s. NTNU
Untitled
|