Kristian Gjøsteen
Kristian Gjøsteen
Bestätigte E-Mail-Adresse bei ntnu.no
Titel
Zitiert von
Zitiert von
Jahr
A Guide to Fully Homomorphic Encryption.
F Armknecht, C Boyd, C Carr, K Gjøsteen, A Jäschke, CA Reuter, ...
IACR Cryptol. ePrint Arch. 2015, 1192, 2015
1322015
Analysis of an internet voting protocol.
K Gjøsteen
IACR Cryptol. ePrint Arch. 2010, 380, 2010
892010
The Norwegian internet voting protocol
K Gjøsteen
International Conference on E-Voting and Identity, 1-18, 2011
882011
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
792008
A security analysis of the NIST SP 800-90 elliptic curve random number generator
DRL Brown, K Gjøsteen
Annual International Cryptology Conference, 466-481, 2007
432007
Comments on Dual-EC-DRBG/NIST SP 800-90, Draft December 2005, March 2006
K Gjøsteen
35*
A new security proof for Damgård’s ElGamal
K Gjøsteen
Cryptographers’ Track at the RSA Conference, 150-158, 2006
302006
Practical and tightly-secure digital signatures and authenticated key exchange
K Gjøsteen, T Jager
Annual International Cryptology Conference, 95-125, 2018
282018
Symmetric subgroup membership problems
K Gjøsteen
International Workshop on Public Key Cryptography, 104-119, 2005
252005
Side channels in deduplication: Trade-offs between leakage and efficiency
F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
202017
Password-based signatures
K Gjøsteen, Ø Thuen
European Public Key Infrastructure Workshop, 17-33, 2011
192011
Homomorphic cryptosystems based on subgroup membership problems
K Gjøsteen
International Conference on Cryptology in Malaysia, 314-327, 2005
192005
Security notions for disk encryption
K Gjøsteen
European Symposium on Research in Computer Security, 455-474, 2005
192005
Subgroup membership problems and public key cryptosystems
K Gjøsteen
Fakultet for informasjonsteknologi, matematikk og elektroteknikk, 2004
182004
Sufficient conditions for composing security protocols
S Andova, CJF Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, ...
Information and Computation, 2007
172007
Highly Efficient Key Exchange Protocols with Optimal Tightness
K Cohn-Gordon, C Cremers, K Gjøsteen, H Jacobsen, T Jager
Annual International Cryptology Conference, 767-797, 2019
112019
A roadmap to fully homomorphic elections: Stronger security, better verifiability
K Gjøsteen, M Strand
International Conference on Financial Cryptography and Data Security, 404-418, 2017
112017
Weaknesses in BankID, a PKI-substitute deployed by Norwegian banks
K Gjøsteen
European Public Key Infrastructure Workshop, 196-206, 2008
102008
A latency-free election scheme
K Gjøsteen
Cryptographers’ Track at the RSA Conference, 425-436, 2008
102008
Universally composable signcryption
K Gjøsteen, L Kråkmo
European Public Key Infrastructure Workshop, 346-353, 2007
102007
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20