Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Kristian
    Last name: Gjøsteen
    DBLP: 90/4628
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 36  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Kristian Gjøsteen, Martin Strand 0001.
    A roadmap to fully homomorphic elections: Stronger security, better verifiability.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
    Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017 2017 (0) 2017
    Conference paper
    Kristian Gjøsteen, Martin Strand 0001.
    A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability.
    Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers 2017 (0) 2017
    Conference paper
    Kristian Gjøsteen, Martin Strand 0001.
    Fully homomorphic encryption must be fat or ugly?
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kristian Gjøsteen, Anders Smedstuen Lund.
    An experiment on the security of the Norwegian electronic voting protocol.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Herman Galteland, Kristian Gjøsteen.
    Malware, Encryption, and Rerandomization - Everything Is Under Attack.
    Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers 2017 (0) 2016
    Conference paper
    Kristian Gjøsteen, Anders Smedstuen Lund.
    The Norwegian Internet Voting Protocol: A new Instantiation.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    James Aspnes, Zoë Diamadi, Aleksandr Yampolskiy, Kristian Gjøsteen, René Peralta.
    Spreading Alerts Quietly and the Subgroup Escape Problem.
    J. Cryptology 2015, Volume 28 (0) 2015
    Conference paper
    Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Gorke, Martin Strand 0001.
    A Guide to Fully Homomorphic Encryption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Kristian Gjøsteen.
    Protocol Variants and Electronic Identification.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen, George Petrides, Asgeir Steine.
    Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get?
    Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen.
    Partially blind password-based signatures using elliptic curves.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen.
    The Norwegian Internet Voting Protocol.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen, George Petrides, Asgeir Steine.
    A Novel Framework for Protocol Analysis.
    Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Kristian Gjøsteen, Øystein Thuen.
    Password-Based Signatures.
    Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Kristian Gjøsteen.
    The Norwegian Internet Voting Protocol.
    E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers 2012 (0) 2011
    Journal article
    Kristian Gjøsteen, George Petrides, Asgeir Steine.
    A Novel Framework for Protocol Analysis.
    J. Internet Serv. Inf. Secur. 2011, Volume 1 (0) 2011
    Conference paper
    Kristian Gjøsteen.
    Analysis of an internet voting protocol.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Kristian Gjøsteen.
    A Latency-Free Election Scheme.
    Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Kristian Gjøsteen.
    Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks.
    Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Kristian Gjøsteen, Lillian Kråkmo.
    Round-Optimal Blind Signatures from Waters Signatures.
    Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Suzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic.
    A framework for compositional verification of security protocols.
    Inf. Comput. 2008, Volume 206 (0) 2008
    Conference paper
    Daniel R. L. Brown, Kristian Gjøsteen.
    A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Show item 1 to 25 of 36  

    Your query returned 36 matches in the database.