Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Kristian Gjøsteen

download as .bib file

@article{DBLP:journals/iacr/Gjosteen24,
  author       = {Kristian Gj{\o}steen},
  title        = {Password-authenticated Key Exchange and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1057},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1057},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoldhahnG24,
  author       = {Oskar Goldhahn and
                  Kristian Gj{\o}steen},
  title        = {Depth Optimized Circuits for Lattice Based Voting with Large Candidate
                  Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1513},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1513},
  timestamp    = {Sat, 05 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoldhahnG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FondevikG24,
  author       = {Elsie Mestl Fondevik and
                  Kristian Gj{\o}steen},
  title        = {Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1994},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1994},
  timestamp    = {Sun, 12 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FondevikG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DraganDEGHRRS23,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Ehsan Estaji and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  title        = {Machine-checked proofs of privacy against malicious boards for Selene
                  {\&} Co},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {5},
  pages        = {469--499},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-230045},
  doi          = {10.3233/JCS-230045},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/DraganDEGHRRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbc/FondevikG23,
  author       = {Elsie Mestl Fondevik and
                  Kristian Gj{\o}steen},
  editor       = {Andre Esser and
                  Paolo Santini},
  title        = {Modeling Noise-Accepting Key Exchange},
  booktitle    = {Code-Based Cryptography - 11th International Workshop, CBCrypto 2023,
                  Lyon, France, April 22-23, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14311},
  pages        = {104--124},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-46495-9\_6},
  doi          = {10.1007/978-3-031-46495-9\_6},
  timestamp    = {Wed, 08 Nov 2023 09:10:53 +0100},
  biburl       = {https://dblp.org/rec/conf/cbc/FondevikG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AranhaBGS23,
  author       = {Diego F. Aranha and
                  Carsten Baum and
                  Kristian Gj{\o}steen and
                  Tjerand Silde},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based
                  Assumptions},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1467--1481},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616683},
  doi          = {10.1145/3576915.3616683},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AranhaBGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GellertGJJ23,
  author       = {Kai Gellert and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via
                  Key Confirmation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {297--329},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_10},
  doi          = {10.1007/978-3-031-38551-3\_10},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GellertGJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DraganDGHRS23,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {Machine-Checked Proofs of Accountability: How to sElect Who is to
                  Blame},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14346},
  pages        = {471--491},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51479-1\_24},
  doi          = {10.1007/978-3-031-51479-1\_24},
  timestamp    = {Thu, 18 Jan 2024 08:27:16 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DraganDGHRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/GjosteenHS23,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Morten Rotvold Solberg},
  editor       = {Melanie Volkamer and
                  David Duenas{-}Cid and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Jurlind Budurushi and
                  Oksana Kulyk and
                  Adri{\`{a}} Rodr{\'{\i}}guez{-}P{\'{e}}rez and
                  Iuliia Spycher{-}Krivonosova},
  title        = {Coercion Mitigation for Voting Systems with Trackers: {A} Selene Case
                  Study},
  booktitle    = {Electronic Voting: 8th International Joint Conference, E-Vote-ID 2023,
                  Luxembourg City, Luxembourg, October 3-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14230},
  pages        = {69--86},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-43756-4\_5},
  doi          = {10.1007/978-3-031-43756-4\_5},
  timestamp    = {Thu, 10 Oct 2024 08:08:48 +0200},
  biburl       = {https://dblp.org/rec/conf/evoteid/GjosteenHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BoydFGM23,
  author       = {Colin Boyd and
                  Elsie Mestl Fondevik and
                  Kristian Gj{\o}steen and
                  Lise Millerjord},
  editor       = {Elias Athanasopoulos and
                  Bart Mennink},
  title        = {Hybrid Group Key Exchange with Application to Constrained Networks},
  booktitle    = {Information Security - 26th International Conference, {ISC} 2023,
                  Groningen, The Netherlands, November 15-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14411},
  pages        = {455--472},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49187-0\_23},
  doi          = {10.1007/978-3-031-49187-0\_23},
  timestamp    = {Sat, 09 Dec 2023 13:01:17 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/BoydFGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RaikwarWG23,
  author       = {Mayank Raikwar and
                  Shuang Wu and
                  Kristian Gj{\o}steen},
  editor       = {Shujun Li and
                  Mark Manulis and
                  Atsuko Miyaji},
  title        = {Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency
                  Systems},
  booktitle    = {Network and System Security - 17th International Conference, {NSS}
                  2023, Canterbury, UK, August 14-16, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13983},
  pages        = {137--152},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-39828-5\_8},
  doi          = {10.1007/978-3-031-39828-5\_8},
  timestamp    = {Sat, 19 Aug 2023 11:36:52 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/RaikwarWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GellertGJJ23,
  author       = {Kai Gellert and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  title        = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via
                  Key Confirmation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/854},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GellertGJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenHS23,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Morten Rotvold Solberg},
  title        = {Coercion Mitigation for Voting Systems with Trackers: {A} Selene Case
                  Study},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1102},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1102},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GjosteenHMRS22,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Johannes M{\"{u}}ller and
                  Peter B. R{\o}nne and
                  Tjerand Silde},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Verifiable Decryption in the Head},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {355--374},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_18},
  doi          = {10.1007/978-3-031-22301-3\_18},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GjosteenHMRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/DraganDEGHRRS22,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Ehsan Estaji and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  title        = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene
                  {\&} Co},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {335--347},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919663},
  doi          = {10.1109/CSF54842.2022.9919663},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/DraganDEGHRRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GjosteenRW22,
  author       = {Kristian Gj{\o}steen and
                  Mayank Raikwar and
                  Shuang Wu},
  editor       = {Steven D. Galbraith},
  title        = {PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof
                  {NIZK} Argument},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  pages        = {589--619},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6\_24},
  doi          = {10.1007/978-3-030-95312-6\_24},
  timestamp    = {Thu, 03 Feb 2022 09:28:38 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GjosteenRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AranhaBGS22,
  author       = {Diego F. Aranha and
                  Carsten Baum and
                  Kristian Gj{\o}steen and
                  Tjerand Silde},
  title        = {Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/422},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AranhaBGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DraganDEGHRRS22,
  author       = {Constantin Catalin Dragan and
                  Fran{\c{c}}ois Dupressoir and
                  Ehsan Estaji and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Peter Y. A. Ryan and
                  Peter B. R{\o}nne and
                  Morten Rotvold Solberg},
  title        = {Machine-Checked Proofs of Privacy Against Malicious Boards for Selene
                  {\&} Co},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1182},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1182},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DraganDEGHRRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AranhaBGST21,
  author       = {Diego F. Aranha and
                  Carsten Baum and
                  Kristian Gj{\o}steen and
                  Tjerand Silde and
                  Thor Tunge},
  editor       = {Kenneth G. Paterson},
  title        = {Lattice-Based Proof of Shuffle and Applications to Electronic Voting},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2021 - Cryptographers' Track at the
                  {RSA} Conference 2021, Virtual Event, May 17-20, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12704},
  pages        = {227--251},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75539-3\_10},
  doi          = {10.1007/978-3-030-75539-3\_10},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AranhaBGST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-04210,
  author       = {Eleanor McMurtry and
                  Xavier Boyen and
                  Chris Culnane and
                  Kristian Gj{\o}steen and
                  Thomas Haines and
                  Vanessa Teague},
  title        = {Towards Verifiable Remote Voting with Paper Assurance},
  journal      = {CoRR},
  volume       = {abs/2111.04210},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.04210},
  eprinttype    = {arXiv},
  eprint       = {2111.04210},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-04210.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AranhaBGST21,
  author       = {Diego F. Aranha and
                  Carsten Baum and
                  Kristian Gj{\o}steen and
                  Tjerand Silde and
                  Thor Tunge},
  title        = {Lattice-Based Proof of Shuffle and Applications to Electronic Voting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/338},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AranhaBGST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenHMRS21,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Johannes M{\"{u}}ller and
                  Peter B. R{\o}nne and
                  Tjerand Silde},
  title        = {Verifiable Decryption in the Head},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/558},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenHMRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DaviesGGJ20,
  author       = {Gareth T. Davies and
                  Herman Galteland and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {82--101},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_5},
  doi          = {10.1007/978-3-030-55304-3\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DaviesGGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/BoydGW20,
  author       = {Colin Boyd and
                  Kristian Gj{\o}steen and
                  Shuang Wu},
  editor       = {Bruno Bernardo and
                  Diego Marmsoler},
  title        = {A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock
                  Contract},
  booktitle    = {2nd Workshop on Formal Methods for Blockchains, FMBC@CAV 2020, July
                  20-21, 2020, Los Angeles, California, {USA} (Virtual Conference)},
  series       = {OASIcs},
  volume       = {84},
  pages        = {5:1--5:13},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/OASIcs.FMBC.2020.5},
  doi          = {10.4230/OASICS.FMBC.2020.5},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/BoydGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BoydDGJ20,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Fast and Secure Updatable Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {464--493},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_16},
  doi          = {10.1007/978-3-030-56784-2\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BoydDGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/evoteid/EstajiHGRRS20,
  author       = {Ehsan Estaji and
                  Thomas Haines and
                  Kristian Gj{\o}steen and
                  Peter B. R{\o}nne and
                  Peter Y. A. Ryan and
                  Najmeh Soroush},
  editor       = {Robert Krimmer and
                  Melanie Volkamer and
                  Bernhard Beckert and
                  Ralf K{\"{u}}sters and
                  Oksana Kulyk and
                  David Duenas{-}Cid and
                  Mikhel Solvak},
  title        = {Revisiting Practical and Usable Coercion-Resistant Remote E-Voting},
  booktitle    = {Electronic Voting - 5th International Joint Conference, E-Vote-ID
                  2020, Bregenz, Austria, October 6-9, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12455},
  pages        = {50--66},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60347-2\_4},
  doi          = {10.1007/978-3-030-60347-2\_4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/evoteid/EstajiHGRRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GjosteenHS20,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Morten Rotvold Solberg},
  editor       = {Mikael Asplund and
                  Simin Nadjm{-}Tehrani},
  title        = {Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How
                  to Verifiably Mix the {PPATC} Scheme},
  booktitle    = {Secure {IT} Systems - 25th Nordic Conference, NordSec 2020, Virtual
                  Event, November 23-24, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12556},
  pages        = {92--107},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-70852-8\_6},
  doi          = {10.1007/978-3-030-70852-8\_6},
  timestamp    = {Mon, 08 Mar 2021 12:43:41 +0100},
  biburl       = {https://dblp.org/rec/conf/nordsec/GjosteenHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KockGV20,
  author       = {Bor de Kock and
                  Kristian Gj{\o}steen and
                  Mattia Veroni},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Practical Isogeny-Based Key-Exchange with Optimal Tightness},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {451--479},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_18},
  doi          = {10.1007/978-3-030-81652-0\_18},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KockGV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KockGV20,
  author       = {Bor de Kock and
                  Kristian Gj{\o}steen and
                  Mattia Veroni},
  title        = {Practical Isogeny-Based Key-exchange with Optimal Tightness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1165},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1165},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KockGV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenHS20,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Morten Rotvold Solberg},
  title        = {Efficient mixing of arbitrary ballots with everlasting privacy: How
                  to verifiably mix the {PPATC} scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1331},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1331},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Cohn-GordonCGJJ19,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Highly Efficient Key Exchange Protocols with Optimal Tightness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {767--797},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_25},
  doi          = {10.1007/978-3-030-26954-8\_25},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Cohn-GordonCGJJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BoydGGH19,
  author       = {Colin Boyd and
                  Kristian Gj{\o}steen and
                  Cl{\'{e}}mentine Gritti and
                  Thomas Haines},
  editor       = {Feng Hao and
                  Sushmita Ruj and
                  Sourav Sen Gupta},
  title        = {A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference
                  on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11898},
  pages        = {250--270},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-35423-7\_13},
  doi          = {10.1007/978-3-030-35423-7\_13},
  timestamp    = {Wed, 20 Mar 2024 15:23:22 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BoydGGH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-02560,
  author       = {Peter B. R{\o}nne and
                  Arash Atashpendar and
                  Kristian Gj{\o}steen and
                  Peter Y. A. Ryan},
  title        = {Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption:
                  Towards a Quantum-Safe Scheme},
  journal      = {CoRR},
  volume       = {abs/1901.02560},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.02560},
  eprinttype    = {arXiv},
  eprint       = {1901.02560},
  timestamp    = {Fri, 01 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-02560.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaltelandG19,
  author       = {Herman Galteland and
                  Kristian Gj{\o}steen},
  title        = {Subliminal channels in post-quantum digital signature schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {574},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/574},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaltelandG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohn-GordonCGJJ19,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  title        = {Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling
                  real-world deployments with theoretically sound parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/737},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohn-GordonCGJJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DaviesGGJ19,
  author       = {Gareth T. Davies and
                  Herman Galteland and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  title        = {Cloud-assisted Asynchronous Key Transport with Post-Quantum Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1409},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1409},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DaviesGGJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGJ19,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  title        = {{RISE} and {SHINE:} Fast and Secure Updatable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1457},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1457},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BoydDGRT18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Definitions for Plaintext-Existence Hiding in Cloud Storage},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {41:1--41:7},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3234515},
  doi          = {10.1145/3230833.3234515},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BoydDGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GjosteenJ18,
  author       = {Kristian Gj{\o}steen and
                  Tibor Jager},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Practical and Tightly-Secure Digital Signatures and Authenticated
                  Key Exchange},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {95--125},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_4},
  doi          = {10.1007/978-3-319-96881-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GjosteenJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BoydDGJ18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  editor       = {Liqun Chen and
                  Mark Manulis and
                  Steve A. Schneider},
  title        = {Offline Assisted Group Key Exchange},
  booktitle    = {Information Security - 21st International Conference, {ISC} 2018,
                  Guildford, UK, September 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11060},
  pages        = {268--285},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99136-8\_15},
  doi          = {10.1007/978-3-319-99136-8\_15},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BoydDGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BoydDGRT18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Security Notions for Cloud Storage and Deduplication},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {347--365},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_20},
  doi          = {10.1007/978-3-030-01446-9\_20},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/BoydDGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1801-06736,
  author       = {Danilo Gligoroski and
                  Kristian Gj{\o}steen and
                  Katina Kralevska},
  title        = {On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices
                  over Finite Fields},
  journal      = {CoRR},
  volume       = {abs/1801.06736},
  year         = {2018},
  url          = {http://arxiv.org/abs/1801.06736},
  eprinttype    = {arXiv},
  eprint       = {1801.06736},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1801-06736.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-09237,
  author       = {Herman Galteland and
                  Kristian Gj{\o}steen},
  title        = {Adversaries monitoring Tor traffic crossing their jurisdictional border
                  and reconstructing Tor circuits},
  journal      = {CoRR},
  volume       = {abs/1808.09237},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.09237},
  eprinttype    = {arXiv},
  eprint       = {1808.09237},
  timestamp    = {Mon, 03 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-09237.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarrCDG018,
  author       = {Christopher Carr and
                  Anamaria Costache and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Martin Strand},
  title        = {Zero-Knowledge Proof of Decryption for {FHE} Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/026},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarrCDG018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGJ18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  title        = {Offline Assisted Group Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/114},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenJ18,
  author       = {Kristian Gj{\o}steen and
                  Tibor Jager},
  title        = {Practical and Tightly-Secure Digital Signatures and Authenticated
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {543},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/543},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGRT18,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  title        = {Definitions for Plaintext-Existence Hiding in Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ArmknechtBDGT17,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Side Channels in Deduplication: Trade-offs between Leakage and Efficiency},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {266--274},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053019},
  doi          = {10.1145/3052973.3053019},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ArmknechtBDGT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Gjosteen017,
  author       = {Kristian Gj{\o}steen and
                  Martin Strand},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {A Roadmap to Fully Homomorphic Elections: Stronger Security, Better
                  Verifiability},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_25},
  doi          = {10.1007/978-3-319-70278-0\_25},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Gjosteen017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenS17,
  author       = {Kristian Gj{\o}steen and
                  Martin Strand},
  title        = {A roadmap to fully homomorphic elections: Stronger security, better
                  verifiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {166},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/166},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaltelandG17,
  author       = {Herman Galteland and
                  Kristian Gj{\o}steen},
  title        = {Malware encryption schemes - rerandomizable ciphertexts encrypted
                  using environmental keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1007},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1007},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaltelandG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoydDGTR17,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani and
                  H{\aa}vard Raddum},
  title        = {Security notions for cloud storage and deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1208},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1208},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoydDGTR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adt/GjosteenL16,
  author       = {Kristian Gj{\o}steen and
                  Anders Smedstuen Lund},
  title        = {An experiment on the security of the Norwegian electronic voting protocol},
  journal      = {Ann. des T{\'{e}}l{\'{e}}communications},
  volume       = {71},
  number       = {7-8},
  pages        = {299--307},
  year         = {2016},
  url          = {https://doi.org/10.1007/s12243-016-0509-8},
  doi          = {10.1007/S12243-016-0509-8},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adt/GjosteenL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/GaltelandG16,
  author       = {Herman Galteland and
                  Kristian Gj{\o}steen},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Malware, Encryption, and Rerandomization - Everything Is Under Attack},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {233--251},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_12},
  doi          = {10.1007/978-3-319-61273-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/GaltelandG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/BoydDGRT16,
  author       = {Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  H{\aa}vard Raddum and
                  Mohsen Toorani},
  title        = {Using Cryptography to Control Your Data at a Distance},
  journal      = {{ERCIM} News},
  volume       = {2016},
  number       = {106},
  year         = {2016},
  url          = {http://ercim-news.ercim.eu/en106/special/using-cryptography-to-control-your-data-at-a-distance},
  timestamp    = {Wed, 22 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ercim/BoydDGRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjosteen016,
  author       = {Kristian Gj{\o}steen and
                  Martin Strand},
  title        = {Fully homomorphic encryption must be fat or ugly?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {105},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/105},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBDGT16,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Gareth T. Davies and
                  Kristian Gj{\o}steen and
                  Mohsen Toorani},
  title        = {Side channels in deduplication: trade-offs between leakage and efficiency},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {977},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/977},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBDGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AspnesDYGP15,
  author       = {James Aspnes and
                  Zo{\"{e}} Diamadi and
                  Aleksandr Yampolskiy and
                  Kristian Gj{\o}steen and
                  Ren{\'{e}} Peralta},
  title        = {Spreading Alerts Quietly and the Subgroup Escape Problem},
  journal      = {J. Cryptol.},
  volume       = {28},
  number       = {4},
  pages        = {796--819},
  year         = {2015},
  url          = {https://doi.org/10.1007/s00145-014-9181-1},
  doi          = {10.1007/S00145-014-9181-1},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/AspnesDYGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GjosteenL15,
  author       = {Kristian Gj{\o}steen and
                  Anders Smedstuen Lund},
  title        = {The Norwegian Internet Voting Protocol: {A} new Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {503},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/503},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GjosteenL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ArmknechtBCGJRS15,
  author       = {Frederik Armknecht and
                  Colin Boyd and
                  Christopher Carr and
                  Kristian Gj{\o}steen and
                  Angela J{\"{a}}schke and
                  Christian A. Reuter and
                  Martin Strand},
  title        = {A Guide to Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1192},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ArmknechtBCGJRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GjosteenPS13,
  author       = {Kristian Gj{\o}steen and
                  George Petrides and
                  Asgeir Steine},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Towards Privacy Preserving Mobile Internet Communications - How Close
                  Can We Get?},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {379--387},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_26},
  doi          = {10.1007/978-3-642-39059-3\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GjosteenPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjosteen13,
  author       = {Kristian Gj{\o}steen},
  title        = {Protocol Variants and Electronic Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {329},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/329},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjosteen13a,
  author       = {Kristian Gj{\o}steen},
  title        = {Partially blind password-based signatures using elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjosteen13b,
  author       = {Kristian Gj{\o}steen},
  title        = {The Norwegian Internet Voting Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen13b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/GjosteenPS11,
  author       = {Kristian Gj{\o}steen and
                  George Petrides and
                  Asgeir Steine},
  title        = {A Novel Framework for Protocol Analysis},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {2/3},
  pages        = {89--106},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.08.31.089},
  doi          = {10.22667/JISIS.2011.08.31.089},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/GjosteenPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/GjosteenT11,
  author       = {Kristian Gj{\o}steen and
                  {\O}ystein Thuen},
  editor       = {Svetla Petkova{-}Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul},
  title        = {Password-Based Signatures},
  booktitle    = {Public Key Infrastructures, Services and Applications - 8th European
                  Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7163},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29804-2\_2},
  doi          = {10.1007/978-3-642-29804-2\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/GjosteenT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/GjosteenPS11,
  author       = {Kristian Gj{\o}steen and
                  George Petrides and
                  Asgeir Steine},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {A Novel Framework for Protocol Analysis},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {340--347},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_24},
  doi          = {10.1007/978-3-642-24316-5\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/GjosteenPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/voteid/Gjosteen11,
  author       = {Kristian Gj{\o}steen},
  editor       = {Aggelos Kiayias and
                  Helger Lipmaa},
  title        = {The Norwegian Internet Voting Protocol},
  booktitle    = {E-Voting and Identity - Third International Conference, VoteID 2011,
                  Tallinn, Estonia, September 28-30, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7187},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32747-6\_1},
  doi          = {10.1007/978-3-642-32747-6\_1},
  timestamp    = {Thu, 27 Feb 2020 12:57:38 +0100},
  biburl       = {https://dblp.org/rec/conf/voteid/Gjosteen11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjsteen10,
  author       = {Kristian Gj{\o}steen},
  title        = {Analysis of an internet voting protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/380},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjsteen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AndovaCGMMR08,
  author       = {Suzana Andova and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  Sjouke Mauw and
                  Stig Fr. Mj{\o}lsnes and
                  Sasa Radomirovic},
  title        = {A framework for compositional verification of security protocols},
  journal      = {Inf. Comput.},
  volume       = {206},
  number       = {2-4},
  pages        = {425--459},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ic.2007.07.002},
  doi          = {10.1016/J.IC.2007.07.002},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/AndovaCGMMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Gjosteen08,
  author       = {Kristian Gj{\o}steen},
  editor       = {Tal Malkin},
  title        = {A Latency-Free Election Scheme},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {425--436},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_27},
  doi          = {10.1007/978-3-540-79263-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Gjosteen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/Gjosteen08,
  author       = {Kristian Gj{\o}steen},
  editor       = {Stig Fr. Mj{\o}lsnes and
                  Sjouke Mauw and
                  Sokratis K. Katsikas},
  title        = {Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks},
  booktitle    = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5057},
  pages        = {196--206},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69485-4\_14},
  doi          = {10.1007/978-3-540-69485-4\_14},
  timestamp    = {Sat, 19 Oct 2019 19:58:51 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/Gjosteen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/GjosteenK08,
  author       = {Kristian Gj{\o}steen and
                  Lillian Kr{\aa}kmo},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Round-Optimal Blind Signatures from Waters Signatures},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {112--126},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_8},
  doi          = {10.1007/978-3-540-88733-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/GjosteenK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BrownG07,
  author       = {Daniel R. L. Brown and
                  Kristian Gj{\o}steen},
  editor       = {Alfred Menezes},
  title        = {A Security Analysis of the {NIST} {SP} 800-90 Elliptic Curve Random
                  Number Generator},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {466--481},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_26},
  doi          = {10.1007/978-3-540-74143-5\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BrownG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/GjosteenK07,
  author       = {Kristian Gj{\o}steen and
                  Lillian Kr{\aa}kmo},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati and
                  Josep L. Ferrer},
  title        = {Universally Composable Signcryption},
  booktitle    = {Public Key Infrastructure, 4th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4582},
  pages        = {346--353},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73408-6\_26},
  doi          = {10.1007/978-3-540-73408-6\_26},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/GjosteenK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrownG07,
  author       = {Daniel R. L. Brown and
                  Kristian Gj{\o}steen},
  title        = {A Security Analysis of the {NIST} {SP} 800-90 Elliptic Curve Random
                  Number Generator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/048},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrownG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Gjosteen06,
  author       = {Kristian Gj{\o}steen},
  editor       = {David Pointcheval},
  title        = {A New Security Proof for Damg{\aa}rd's ElGamal},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {150--158},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_10},
  doi          = {10.1007/11605805\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Gjosteen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0611062,
  author       = {Suzana Andova and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  Sjouke Mauw and
                  Stig Fr. Mj{\o}lsnes and
                  Sasa Radomirovic},
  title        = {A framework for compositional verification of security protocols},
  journal      = {CoRR},
  volume       = {abs/cs/0611062},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0611062},
  eprinttype    = {arXiv},
  eprint       = {cs/0611062},
  timestamp    = {Mon, 23 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0611062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjosteen06,
  author       = {Kristian Gj{\o}steen},
  title        = {A Latency-Free Election Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/366},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjosteen06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BuanGK06,
  author       = {Aslak Bakke Buan and
                  Kristian Gj{\o}steen and
                  Lillian Kr{\aa}kmo},
  title        = {Universally Composable Blind Signatures in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {405},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/405},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BuanGK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AspnesDGPY05,
  author       = {James Aspnes and
                  Zo{\"{e}} Diamadi and
                  Kristian Gj{\o}steen and
                  Ren{\'{e}} Peralta and
                  Aleksandr Yampolskiy},
  editor       = {Bimal K. Roy},
  title        = {Spreading Alerts Quietly and the Subgroup Escape Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_14},
  doi          = {10.1007/11593447\_14},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AspnesDGPY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Gjosteen05,
  author       = {Kristian Gj{\o}steen},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Security Notions for Disk Encryption},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {455--474},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_26},
  doi          = {10.1007/11555827\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Gjosteen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Gjosteen05,
  author       = {Kristian Gj{\o}steen},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Homomorphic Cryptosystems Based on Subgroup Membership Problems},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {314--327},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_22},
  doi          = {10.1007/11554868\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Gjosteen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Gjosteen05,
  author       = {Kristian Gj{\o}steen},
  editor       = {Serge Vaudenay},
  title        = {Symmetric Subgroup Membership Problems},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {104--119},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_8},
  doi          = {10.1007/978-3-540-30580-4\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Gjosteen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjsteen05,
  author       = {Kristian Gj{\o}steen},
  title        = {Security notions for disk encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjsteen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AspnesDGPY05,
  author       = {James Aspnes and
                  Zo{\"{e}} Diamadi and
                  Kristian Gj{\o}steen and
                  Ren{\'{e}} Peralta and
                  Aleksandr Yampolskiy},
  title        = {Spreading Alerts Quietly and the Subgroup Escape Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {282},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/282},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AspnesDGPY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjsteen04,
  author       = {Kristian Gj{\o}steen},
  title        = {A new security proof for Damg{\aa}rd's ElGamal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {362},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/362},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjsteen04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gjsteen03,
  author       = {Kristian Gj{\o}steen},
  title        = {Homomorphic public-key systems based on subgroup membership problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gjsteen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}