Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Kristian
    Last name: Gjøsteen
    DBLP: 90/4628
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 32  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Kristian Gjøsteen, Martin Strand 0001.
    Fully homomorphic encryption must be fat or ugly?
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kristian Gjøsteen, Anders Smedstuen Lund.
    An experiment on the security of the Norwegian electronic voting protocol.
    Annales des Télécommunications 2016, Volume 71 (0) 2016
    Conference paper
    Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani.
    Using Cryptography to Control Your Data at a Distance.
    ERCIM News 2016, Volume 2016 (0) 2016
    Conference paper
    Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani.
    Side channels in deduplication: trade-offs between leakage and efficiency.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kristian Gjøsteen, Anders Smedstuen Lund.
    The Norwegian Internet Voting Protocol: A new Instantiation.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    James Aspnes, Zoë Diamadi, Aleksandr Yampolskiy, Kristian Gjøsteen, René Peralta.
    Spreading Alerts Quietly and the Subgroup Escape Problem.
    J. Cryptology 2015, Volume 28 (0) 2015
    Conference paper
    Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand 0001.
    A Guide to Fully Homomorphic Encryption.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Kristian Gjøsteen.
    Protocol Variants and Electronic Identification.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen, George Petrides, Asgeir Steine.
    Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get?
    Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen.
    Partially blind password-based signatures using elliptic curves.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen.
    The Norwegian Internet Voting Protocol.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Kristian Gjøsteen, George Petrides, Asgeir Steine.
    A Novel Framework for Protocol Analysis.
    Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Kristian Gjøsteen, Øystein Thuen.
    Password-Based Signatures.
    Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers 2012 (0) 2011
    Conference paper
    Kristian Gjøsteen.
    The Norwegian Internet Voting Protocol.
    E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers 2012 (0) 2011
    Journal article
    Kristian Gjøsteen, George Petrides, Asgeir Steine.
    A Novel Framework for Protocol Analysis.
    J. Internet Serv. Inf. Secur. 2011, Volume 1 (0) 2011
    Conference paper
    Kristian Gjøsteen.
    Analysis of an internet voting protocol.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Kristian Gjøsteen.
    A Latency-Free Election Scheme.
    Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Kristian Gjøsteen.
    Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks.
    Public Key Infrastructure, 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings 2008 (0) 2008
    Conference paper
    Kristian Gjøsteen, Lillian Kråkmo.
    Round-Optimal Blind Signatures from Waters Signatures.
    Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Suzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic.
    A framework for compositional verification of security protocols.
    Inf. Comput. 2008, Volume 206 (0) 2008
    Conference paper
    Daniel R. L. Brown, Kristian Gjøsteen.
    A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
    IACR Cryptology ePrint Archive 2007, Volume 2007 (0) 2007
    Conference paper
    Daniel R. L. Brown, Kristian Gjøsteen.
    A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
    Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Kristian Gjøsteen, Lillian Kråkmo.
    Universally Composable Signcryption.
    Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Aslak Bakke Buan, Kristian Gjøsteen, Lillian Kråkmo.
    Universally Composable Blind Signatures in the Plain Model.
    IACR Cryptology ePrint Archive 2006, Volume 2006 (0) 2006
    Conference paper
    Kristian Gjøsteen.
    A Latency-Free Election Scheme.
    IACR Cryptology ePrint Archive 2006, Volume 2006 (0) 2006
    Show item 1 to 25 of 32  

    Your query returned 32 matches in the database.