


default search action
BibTeX records: Kristian Gjøsteen
@article{DBLP:journals/iacr/Gjosteen24, author = {Kristian Gj{\o}steen}, title = {Password-authenticated Key Exchange and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1057}, year = {2024}, url = {https://eprint.iacr.org/2024/1057}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjosteen24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoldhahnG24, author = {Oskar Goldhahn and Kristian Gj{\o}steen}, title = {Depth Optimized Circuits for Lattice Based Voting with Large Candidate Sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1513}, year = {2024}, url = {https://eprint.iacr.org/2024/1513}, timestamp = {Sat, 05 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoldhahnG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FondevikG24, author = {Elsie Mestl Fondevik and Kristian Gj{\o}steen}, title = {Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1994}, year = {2024}, url = {https://eprint.iacr.org/2024/1994}, timestamp = {Sun, 12 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FondevikG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DraganDEGHRRS23, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Ehsan Estaji and Kristian Gj{\o}steen and Thomas Haines and Peter Y. A. Ryan and Peter B. R{\o}nne and Morten Rotvold Solberg}, title = {Machine-checked proofs of privacy against malicious boards for Selene {\&} Co}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {469--499}, year = {2023}, url = {https://doi.org/10.3233/JCS-230045}, doi = {10.3233/JCS-230045}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DraganDEGHRRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cbc/FondevikG23, author = {Elsie Mestl Fondevik and Kristian Gj{\o}steen}, editor = {Andre Esser and Paolo Santini}, title = {Modeling Noise-Accepting Key Exchange}, booktitle = {Code-Based Cryptography - 11th International Workshop, CBCrypto 2023, Lyon, France, April 22-23, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14311}, pages = {104--124}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-46495-9\_6}, doi = {10.1007/978-3-031-46495-9\_6}, timestamp = {Wed, 08 Nov 2023 09:10:53 +0100}, biburl = {https://dblp.org/rec/conf/cbc/FondevikG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AranhaBGS23, author = {Diego F. Aranha and Carsten Baum and Kristian Gj{\o}steen and Tjerand Silde}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1467--1481}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616683}, doi = {10.1145/3576915.3616683}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AranhaBGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GellertGJJ23, author = {Kai Gellert and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {297--329}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_10}, doi = {10.1007/978-3-031-38551-3\_10}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GellertGJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DraganDGHRS23, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Kristian Gj{\o}steen and Thomas Haines and Peter B. R{\o}nne and Morten Rotvold Solberg}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Machine-Checked Proofs of Accountability: How to sElect Who is to Blame}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14346}, pages = {471--491}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51479-1\_24}, doi = {10.1007/978-3-031-51479-1\_24}, timestamp = {Thu, 18 Jan 2024 08:27:16 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DraganDGHRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/GjosteenHS23, author = {Kristian Gj{\o}steen and Thomas Haines and Morten Rotvold Solberg}, editor = {Melanie Volkamer and David Duenas{-}Cid and Peter B. R{\o}nne and Peter Y. A. Ryan and Jurlind Budurushi and Oksana Kulyk and Adri{\`{a}} Rodr{\'{\i}}guez{-}P{\'{e}}rez and Iuliia Spycher{-}Krivonosova}, title = {Coercion Mitigation for Voting Systems with Trackers: {A} Selene Case Study}, booktitle = {Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023, Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14230}, pages = {69--86}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-43756-4\_5}, doi = {10.1007/978-3-031-43756-4\_5}, timestamp = {Thu, 10 Oct 2024 08:08:48 +0200}, biburl = {https://dblp.org/rec/conf/evoteid/GjosteenHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BoydFGM23, author = {Colin Boyd and Elsie Mestl Fondevik and Kristian Gj{\o}steen and Lise Millerjord}, editor = {Elias Athanasopoulos and Bart Mennink}, title = {Hybrid Group Key Exchange with Application to Constrained Networks}, booktitle = {Information Security - 26th International Conference, {ISC} 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14411}, pages = {455--472}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49187-0\_23}, doi = {10.1007/978-3-031-49187-0\_23}, timestamp = {Sat, 09 Dec 2023 13:01:17 +0100}, biburl = {https://dblp.org/rec/conf/isw/BoydFGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/RaikwarWG23, author = {Mayank Raikwar and Shuang Wu and Kristian Gj{\o}steen}, editor = {Shujun Li and Mark Manulis and Atsuko Miyaji}, title = {Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems}, booktitle = {Network and System Security - 17th International Conference, {NSS} 2023, Canterbury, UK, August 14-16, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13983}, pages = {137--152}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39828-5\_8}, doi = {10.1007/978-3-031-39828-5\_8}, timestamp = {Sat, 19 Aug 2023 11:36:52 +0200}, biburl = {https://dblp.org/rec/conf/nss/RaikwarWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GellertGJJ23, author = {Kai Gellert and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, title = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2023}, url = {https://eprint.iacr.org/2023/854}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GellertGJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenHS23, author = {Kristian Gj{\o}steen and Thomas Haines and Morten Rotvold Solberg}, title = {Coercion Mitigation for Voting Systems with Trackers: {A} Selene Case Study}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1102}, year = {2023}, url = {https://eprint.iacr.org/2023/1102}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GjosteenHMRS22, author = {Kristian Gj{\o}steen and Thomas Haines and Johannes M{\"{u}}ller and Peter B. R{\o}nne and Tjerand Silde}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Verifiable Decryption in the Head}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {355--374}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_18}, doi = {10.1007/978-3-031-22301-3\_18}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GjosteenHMRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/DraganDEGHRRS22, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Ehsan Estaji and Kristian Gj{\o}steen and Thomas Haines and Peter Y. A. Ryan and Peter B. R{\o}nne and Morten Rotvold Solberg}, title = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene {\&} Co}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {335--347}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919663}, doi = {10.1109/CSF54842.2022.9919663}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/DraganDEGHRRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GjosteenRW22, author = {Kristian Gj{\o}steen and Mayank Raikwar and Shuang Wu}, editor = {Steven D. Galbraith}, title = {PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof {NIZK} Argument}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {589--619}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_24}, doi = {10.1007/978-3-030-95312-6\_24}, timestamp = {Thu, 03 Feb 2022 09:28:38 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GjosteenRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AranhaBGS22, author = {Diego F. Aranha and Carsten Baum and Kristian Gj{\o}steen and Tjerand Silde}, title = {Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {422}, year = {2022}, url = {https://eprint.iacr.org/2022/422}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AranhaBGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DraganDEGHRRS22, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Ehsan Estaji and Kristian Gj{\o}steen and Thomas Haines and Peter Y. A. Ryan and Peter B. R{\o}nne and Morten Rotvold Solberg}, title = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene {\&} Co}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1182}, year = {2022}, url = {https://eprint.iacr.org/2022/1182}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DraganDEGHRRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AranhaBGST21, author = {Diego F. Aranha and Carsten Baum and Kristian Gj{\o}steen and Tjerand Silde and Thor Tunge}, editor = {Kenneth G. Paterson}, title = {Lattice-Based Proof of Shuffle and Applications to Electronic Voting}, booktitle = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12704}, pages = {227--251}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75539-3\_10}, doi = {10.1007/978-3-030-75539-3\_10}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AranhaBGST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-04210, author = {Eleanor McMurtry and Xavier Boyen and Chris Culnane and Kristian Gj{\o}steen and Thomas Haines and Vanessa Teague}, title = {Towards Verifiable Remote Voting with Paper Assurance}, journal = {CoRR}, volume = {abs/2111.04210}, year = {2021}, url = {https://arxiv.org/abs/2111.04210}, eprinttype = {arXiv}, eprint = {2111.04210}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-04210.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AranhaBGST21, author = {Diego F. Aranha and Carsten Baum and Kristian Gj{\o}steen and Tjerand Silde and Thor Tunge}, title = {Lattice-Based Proof of Shuffle and Applications to Electronic Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2021}, url = {https://eprint.iacr.org/2021/338}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AranhaBGST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenHMRS21, author = {Kristian Gj{\o}steen and Thomas Haines and Johannes M{\"{u}}ller and Peter B. R{\o}nne and Tjerand Silde}, title = {Verifiable Decryption in the Head}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2021}, url = {https://eprint.iacr.org/2021/558}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenHMRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DaviesGGJ20, author = {Gareth T. Davies and Herman Galteland and Kristian Gj{\o}steen and Yao Jiang}, editor = {Joseph K. Liu and Hui Cui}, title = {Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {82--101}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_5}, doi = {10.1007/978-3-030-55304-3\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DaviesGGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/BoydGW20, author = {Colin Boyd and Kristian Gj{\o}steen and Shuang Wu}, editor = {Bruno Bernardo and Diego Marmsoler}, title = {A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract}, booktitle = {2nd Workshop on Formal Methods for Blockchains, FMBC@CAV 2020, July 20-21, 2020, Los Angeles, California, {USA} (Virtual Conference)}, series = {OASIcs}, volume = {84}, pages = {5:1--5:13}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/OASIcs.FMBC.2020.5}, doi = {10.4230/OASICS.FMBC.2020.5}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/BoydGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoydDGJ20, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Yao Jiang}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Fast and Secure Updatable Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {464--493}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_16}, doi = {10.1007/978-3-030-56784-2\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoydDGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/evoteid/EstajiHGRRS20, author = {Ehsan Estaji and Thomas Haines and Kristian Gj{\o}steen and Peter B. R{\o}nne and Peter Y. A. Ryan and Najmeh Soroush}, editor = {Robert Krimmer and Melanie Volkamer and Bernhard Beckert and Ralf K{\"{u}}sters and Oksana Kulyk and David Duenas{-}Cid and Mikhel Solvak}, title = {Revisiting Practical and Usable Coercion-Resistant Remote E-Voting}, booktitle = {Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12455}, pages = {50--66}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60347-2\_4}, doi = {10.1007/978-3-030-60347-2\_4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/evoteid/EstajiHGRRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GjosteenHS20, author = {Kristian Gj{\o}steen and Thomas Haines and Morten Rotvold Solberg}, editor = {Mikael Asplund and Simin Nadjm{-}Tehrani}, title = {Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the {PPATC} Scheme}, booktitle = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, November 23-24, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12556}, pages = {92--107}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-70852-8\_6}, doi = {10.1007/978-3-030-70852-8\_6}, timestamp = {Mon, 08 Mar 2021 12:43:41 +0100}, biburl = {https://dblp.org/rec/conf/nordsec/GjosteenHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KockGV20, author = {Bor de Kock and Kristian Gj{\o}steen and Mattia Veroni}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {Practical Isogeny-Based Key-Exchange with Optimal Tightness}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {451--479}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_18}, doi = {10.1007/978-3-030-81652-0\_18}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KockGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KockGV20, author = {Bor de Kock and Kristian Gj{\o}steen and Mattia Veroni}, title = {Practical Isogeny-Based Key-exchange with Optimal Tightness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1165}, year = {2020}, url = {https://eprint.iacr.org/2020/1165}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KockGV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenHS20, author = {Kristian Gj{\o}steen and Thomas Haines and Morten Rotvold Solberg}, title = {Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the {PPATC} scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1331}, year = {2020}, url = {https://eprint.iacr.org/2020/1331}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Cohn-GordonCGJJ19, author = {Katriel Cohn{-}Gordon and Cas Cremers and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Highly Efficient Key Exchange Protocols with Optimal Tightness}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {767--797}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_25}, doi = {10.1007/978-3-030-26954-8\_25}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Cohn-GordonCGJJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BoydGGH19, author = {Colin Boyd and Kristian Gj{\o}steen and Cl{\'{e}}mentine Gritti and Thomas Haines}, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {250--270}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_13}, doi = {10.1007/978-3-030-35423-7\_13}, timestamp = {Wed, 20 Mar 2024 15:23:22 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/BoydGGH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-02560, author = {Peter B. R{\o}nne and Arash Atashpendar and Kristian Gj{\o}steen and Peter Y. A. Ryan}, title = {Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme}, journal = {CoRR}, volume = {abs/1901.02560}, year = {2019}, url = {http://arxiv.org/abs/1901.02560}, eprinttype = {arXiv}, eprint = {1901.02560}, timestamp = {Fri, 01 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-02560.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaltelandG19, author = {Herman Galteland and Kristian Gj{\o}steen}, title = {Subliminal channels in post-quantum digital signature schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {574}, year = {2019}, url = {https://eprint.iacr.org/2019/574}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaltelandG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohn-GordonCGJJ19, author = {Katriel Cohn{-}Gordon and Cas Cremers and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, title = {Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2019}, url = {https://eprint.iacr.org/2019/737}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohn-GordonCGJJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DaviesGGJ19, author = {Gareth T. Davies and Herman Galteland and Kristian Gj{\o}steen and Yao Jiang}, title = {Cloud-assisted Asynchronous Key Transport with Post-Quantum Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1409}, year = {2019}, url = {https://eprint.iacr.org/2019/1409}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DaviesGGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGJ19, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Yao Jiang}, title = {{RISE} and {SHINE:} Fast and Secure Updatable Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1457}, year = {2019}, url = {https://eprint.iacr.org/2019/1457}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BoydDGRT18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Definitions for Plaintext-Existence Hiding in Cloud Storage}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {41:1--41:7}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3234515}, doi = {10.1145/3230833.3234515}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BoydDGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GjosteenJ18, author = {Kristian Gj{\o}steen and Tibor Jager}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {95--125}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_4}, doi = {10.1007/978-3-319-96881-0\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GjosteenJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BoydDGJ18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Yao Jiang}, editor = {Liqun Chen and Mark Manulis and Steve A. Schneider}, title = {Offline Assisted Group Key Exchange}, booktitle = {Information Security - 21st International Conference, {ISC} 2018, Guildford, UK, September 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11060}, pages = {268--285}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99136-8\_15}, doi = {10.1007/978-3-319-99136-8\_15}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/isw/BoydDGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BoydDGRT18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Security Notions for Cloud Storage and Deduplication}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {347--365}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_20}, doi = {10.1007/978-3-030-01446-9\_20}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BoydDGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-06736, author = {Danilo Gligoroski and Kristian Gj{\o}steen and Katina Kralevska}, title = {On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields}, journal = {CoRR}, volume = {abs/1801.06736}, year = {2018}, url = {http://arxiv.org/abs/1801.06736}, eprinttype = {arXiv}, eprint = {1801.06736}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-06736.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-09237, author = {Herman Galteland and Kristian Gj{\o}steen}, title = {Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits}, journal = {CoRR}, volume = {abs/1808.09237}, year = {2018}, url = {http://arxiv.org/abs/1808.09237}, eprinttype = {arXiv}, eprint = {1808.09237}, timestamp = {Mon, 03 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-09237.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarrCDG018, author = {Christopher Carr and Anamaria Costache and Gareth T. Davies and Kristian Gj{\o}steen and Martin Strand}, title = {Zero-Knowledge Proof of Decryption for {FHE} Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2018}, url = {http://eprint.iacr.org/2018/026}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarrCDG018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGJ18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Yao Jiang}, title = {Offline Assisted Group Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2018}, url = {http://eprint.iacr.org/2018/114}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenJ18, author = {Kristian Gj{\o}steen and Tibor Jager}, title = {Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {543}, year = {2018}, url = {https://eprint.iacr.org/2018/543}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGRT18, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, title = {Definitions for Plaintext-Existence Hiding in Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2018}, url = {https://eprint.iacr.org/2018/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ArmknechtBDGT17, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Side Channels in Deduplication: Trade-offs between Leakage and Efficiency}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {266--274}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053019}, doi = {10.1145/3052973.3053019}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ArmknechtBDGT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Gjosteen017, author = {Kristian Gj{\o}steen and Martin Strand}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {404--418}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_25}, doi = {10.1007/978-3-319-70278-0\_25}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/Gjosteen017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenS17, author = {Kristian Gj{\o}steen and Martin Strand}, title = {A roadmap to fully homomorphic elections: Stronger security, better verifiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {166}, year = {2017}, url = {http://eprint.iacr.org/2017/166}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaltelandG17, author = {Herman Galteland and Kristian Gj{\o}steen}, title = {Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1007}, year = {2017}, url = {http://eprint.iacr.org/2017/1007}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaltelandG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydDGTR17, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani and H{\aa}vard Raddum}, title = {Security notions for cloud storage and deduplication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1208}, year = {2017}, url = {http://eprint.iacr.org/2017/1208}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydDGTR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adt/GjosteenL16, author = {Kristian Gj{\o}steen and Anders Smedstuen Lund}, title = {An experiment on the security of the Norwegian electronic voting protocol}, journal = {Ann. des T{\'{e}}l{\'{e}}communications}, volume = {71}, number = {7-8}, pages = {299--307}, year = {2016}, url = {https://doi.org/10.1007/s12243-016-0509-8}, doi = {10.1007/S12243-016-0509-8}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adt/GjosteenL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/GaltelandG16, author = {Herman Galteland and Kristian Gj{\o}steen}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Malware, Encryption, and Rerandomization - Everything Is Under Attack}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {233--251}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_12}, doi = {10.1007/978-3-319-61273-7\_12}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/GaltelandG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/BoydDGRT16, author = {Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and H{\aa}vard Raddum and Mohsen Toorani}, title = {Using Cryptography to Control Your Data at a Distance}, journal = {{ERCIM} News}, volume = {2016}, number = {106}, year = {2016}, url = {http://ercim-news.ercim.eu/en106/special/using-cryptography-to-control-your-data-at-a-distance}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/BoydDGRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjosteen016, author = {Kristian Gj{\o}steen and Martin Strand}, title = {Fully homomorphic encryption must be fat or ugly?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {105}, year = {2016}, url = {http://eprint.iacr.org/2016/105}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjosteen016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBDGT16, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gj{\o}steen and Mohsen Toorani}, title = {Side channels in deduplication: trade-offs between leakage and efficiency}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {977}, year = {2016}, url = {http://eprint.iacr.org/2016/977}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AspnesDYGP15, author = {James Aspnes and Zo{\"{e}} Diamadi and Aleksandr Yampolskiy and Kristian Gj{\o}steen and Ren{\'{e}} Peralta}, title = {Spreading Alerts Quietly and the Subgroup Escape Problem}, journal = {J. Cryptol.}, volume = {28}, number = {4}, pages = {796--819}, year = {2015}, url = {https://doi.org/10.1007/s00145-014-9181-1}, doi = {10.1007/S00145-014-9181-1}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/AspnesDYGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GjosteenL15, author = {Kristian Gj{\o}steen and Anders Smedstuen Lund}, title = {The Norwegian Internet Voting Protocol: {A} new Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {503}, year = {2015}, url = {http://eprint.iacr.org/2015/503}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GjosteenL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ArmknechtBCGJRS15, author = {Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gj{\o}steen and Angela J{\"{a}}schke and Christian A. Reuter and Martin Strand}, title = {A Guide to Fully Homomorphic Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1192}, year = {2015}, url = {http://eprint.iacr.org/2015/1192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ArmknechtBCGJRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GjosteenPS13, author = {Kristian Gj{\o}steen and George Petrides and Asgeir Steine}, editor = {Colin Boyd and Leonie Simpson}, title = {Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get?}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {379--387}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_26}, doi = {10.1007/978-3-642-39059-3\_26}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GjosteenPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjosteen13, author = {Kristian Gj{\o}steen}, title = {Protocol Variants and Electronic Identification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {329}, year = {2013}, url = {http://eprint.iacr.org/2013/329}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjosteen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjosteen13a, author = {Kristian Gj{\o}steen}, title = {Partially blind password-based signatures using elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2013}, url = {http://eprint.iacr.org/2013/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjosteen13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjosteen13b, author = {Kristian Gj{\o}steen}, title = {The Norwegian Internet Voting Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2013}, url = {http://eprint.iacr.org/2013/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjosteen13b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/GjosteenPS11, author = {Kristian Gj{\o}steen and George Petrides and Asgeir Steine}, title = {A Novel Framework for Protocol Analysis}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {2/3}, pages = {89--106}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.08.31.089}, doi = {10.22667/JISIS.2011.08.31.089}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/GjosteenPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/GjosteenT11, author = {Kristian Gj{\o}steen and {\O}ystein Thuen}, editor = {Svetla Petkova{-}Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul}, title = {Password-Based Signatures}, booktitle = {Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7163}, pages = {17--33}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29804-2\_2}, doi = {10.1007/978-3-642-29804-2\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/europki/GjosteenT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GjosteenPS11, author = {Kristian Gj{\o}steen and George Petrides and Asgeir Steine}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {A Novel Framework for Protocol Analysis}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {340--347}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_24}, doi = {10.1007/978-3-642-24316-5\_24}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GjosteenPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/Gjosteen11, author = {Kristian Gj{\o}steen}, editor = {Aggelos Kiayias and Helger Lipmaa}, title = {The Norwegian Internet Voting Protocol}, booktitle = {E-Voting and Identity - Third International Conference, VoteID 2011, Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7187}, pages = {1--18}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32747-6\_1}, doi = {10.1007/978-3-642-32747-6\_1}, timestamp = {Thu, 27 Feb 2020 12:57:38 +0100}, biburl = {https://dblp.org/rec/conf/voteid/Gjosteen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjsteen10, author = {Kristian Gj{\o}steen}, title = {Analysis of an internet voting protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2010}, url = {http://eprint.iacr.org/2010/380}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjsteen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AndovaCGMMR08, author = {Suzana Andova and Cas Cremers and Kristian Gj{\o}steen and Sjouke Mauw and Stig Fr. Mj{\o}lsnes and Sasa Radomirovic}, title = {A framework for compositional verification of security protocols}, journal = {Inf. Comput.}, volume = {206}, number = {2-4}, pages = {425--459}, year = {2008}, url = {https://doi.org/10.1016/j.ic.2007.07.002}, doi = {10.1016/J.IC.2007.07.002}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/AndovaCGMMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Gjosteen08, author = {Kristian Gj{\o}steen}, editor = {Tal Malkin}, title = {A Latency-Free Election Scheme}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {425--436}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_27}, doi = {10.1007/978-3-540-79263-5\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Gjosteen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/Gjosteen08, author = {Kristian Gj{\o}steen}, editor = {Stig Fr. Mj{\o}lsnes and Sjouke Mauw and Sokratis K. Katsikas}, title = {Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks}, booktitle = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5057}, pages = {196--206}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69485-4\_14}, doi = {10.1007/978-3-540-69485-4\_14}, timestamp = {Sat, 19 Oct 2019 19:58:51 +0200}, biburl = {https://dblp.org/rec/conf/europki/Gjosteen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/GjosteenK08, author = {Kristian Gj{\o}steen and Lillian Kr{\aa}kmo}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Round-Optimal Blind Signatures from Waters Signatures}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {112--126}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_8}, doi = {10.1007/978-3-540-88733-1\_8}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/GjosteenK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BrownG07, author = {Daniel R. L. Brown and Kristian Gj{\o}steen}, editor = {Alfred Menezes}, title = {A Security Analysis of the {NIST} {SP} 800-90 Elliptic Curve Random Number Generator}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {466--481}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_26}, doi = {10.1007/978-3-540-74143-5\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BrownG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/GjosteenK07, author = {Kristian Gj{\o}steen and Lillian Kr{\aa}kmo}, editor = {Javier L{\'{o}}pez and Pierangela Samarati and Josep L. Ferrer}, title = {Universally Composable Signcryption}, booktitle = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4582}, pages = {346--353}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73408-6\_26}, doi = {10.1007/978-3-540-73408-6\_26}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/GjosteenK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrownG07, author = {Daniel R. L. Brown and Kristian Gj{\o}steen}, title = {A Security Analysis of the {NIST} {SP} 800-90 Elliptic Curve Random Number Generator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2007}, url = {http://eprint.iacr.org/2007/048}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrownG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Gjosteen06, author = {Kristian Gj{\o}steen}, editor = {David Pointcheval}, title = {A New Security Proof for Damg{\aa}rd's ElGamal}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {150--158}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_10}, doi = {10.1007/11605805\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Gjosteen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0611062, author = {Suzana Andova and Cas Cremers and Kristian Gj{\o}steen and Sjouke Mauw and Stig Fr. Mj{\o}lsnes and Sasa Radomirovic}, title = {A framework for compositional verification of security protocols}, journal = {CoRR}, volume = {abs/cs/0611062}, year = {2006}, url = {http://arxiv.org/abs/cs/0611062}, eprinttype = {arXiv}, eprint = {cs/0611062}, timestamp = {Mon, 23 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0611062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjosteen06, author = {Kristian Gj{\o}steen}, title = {A Latency-Free Election Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2006}, url = {http://eprint.iacr.org/2006/366}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjosteen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BuanGK06, author = {Aslak Bakke Buan and Kristian Gj{\o}steen and Lillian Kr{\aa}kmo}, title = {Universally Composable Blind Signatures in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {405}, year = {2006}, url = {http://eprint.iacr.org/2006/405}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BuanGK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AspnesDGPY05, author = {James Aspnes and Zo{\"{e}} Diamadi and Kristian Gj{\o}steen and Ren{\'{e}} Peralta and Aleksandr Yampolskiy}, editor = {Bimal K. Roy}, title = {Spreading Alerts Quietly and the Subgroup Escape Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {253--272}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_14}, doi = {10.1007/11593447\_14}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AspnesDGPY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Gjosteen05, author = {Kristian Gj{\o}steen}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Security Notions for Disk Encryption}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {455--474}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_26}, doi = {10.1007/11555827\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/Gjosteen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Gjosteen05, author = {Kristian Gj{\o}steen}, editor = {Ed Dawson and Serge Vaudenay}, title = {Homomorphic Cryptosystems Based on Subgroup Membership Problems}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {314--327}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_22}, doi = {10.1007/11554868\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Gjosteen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Gjosteen05, author = {Kristian Gj{\o}steen}, editor = {Serge Vaudenay}, title = {Symmetric Subgroup Membership Problems}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {104--119}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_8}, doi = {10.1007/978-3-540-30580-4\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Gjosteen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjsteen05, author = {Kristian Gj{\o}steen}, title = {Security notions for disk encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2005}, url = {http://eprint.iacr.org/2005/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjsteen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AspnesDGPY05, author = {James Aspnes and Zo{\"{e}} Diamadi and Kristian Gj{\o}steen and Ren{\'{e}} Peralta and Aleksandr Yampolskiy}, title = {Spreading Alerts Quietly and the Subgroup Escape Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {282}, year = {2005}, url = {http://eprint.iacr.org/2005/282}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AspnesDGPY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjsteen04, author = {Kristian Gj{\o}steen}, title = {A new security proof for Damg{\aa}rd's ElGamal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {362}, year = {2004}, url = {http://eprint.iacr.org/2004/362}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjsteen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gjsteen03, author = {Kristian Gj{\o}steen}, title = {Homomorphic public-key systems based on subgroup membership problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {131}, year = {2003}, url = {http://eprint.iacr.org/2003/131}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gjsteen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.