Kristian Gjøsteen

From MaRDI portal
Person:826256


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Modeling noise-accepting key exchange
 
2024-06-05Paper
On optimal tightness for key exchange with full forward secrecy via key confirmation
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Offline Assisted Group Key Exchange
Developments in Language Theory
2023-06-30Paper
Fast and secure updatable encryption
 
2022-11-09Paper
Practical mathematical cryptography
 
2022-11-03Paper
Pribank: confidential blockchain scaling using short commit-and-proof NIZK argument
 
2022-07-06Paper
Practical isogeny-based key-exchange with optimal tightness
 
2022-03-25Paper
Security notions for disk encryption
Computer Security – ESORICS 2005
2022-03-09Paper
Lattice-based proof of shuffle and applications to electronic voting
 
2021-12-20Paper
Cloud-assisted asynchronous key transport with post-quantum security
 
2021-06-08Paper
A blind coupon mechanism enabling veto voting over unreliable networks
 
2020-05-12Paper
Highly efficient key exchange protocols with optimal tightness
 
2020-03-09Paper
Security notions for cloud storage and deduplication
 
2018-11-07Paper
Practical and tightly-secure digital signatures and authenticated key exchange
 
2018-09-26Paper
Malware, encryption, and rerandomization -- everything Is under attack
 
2017-10-23Paper
Spreading alerts quietly and the subgroup escape problem
Journal of Cryptology
2016-01-11Paper
A novel framework for protocol analysis
Provable Security
2011-09-16Paper
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
Advances in Cryptology - CRYPTO 2007
2009-03-10Paper
Round-Optimal Blind Signatures from Waters Signatures
Provable Security
2009-01-27Paper
Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks
Public Key Infrastructure
2008-06-12Paper
A Latency-Free Election Scheme
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
A framework for compositional verification of security protocols
Information and Computation
2008-04-16Paper
Spreading Alerts Quietly and the Subgroup Escape Problem
Lecture Notes in Computer Science
2008-03-18Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper


Research outcomes over time


This page was built for person: Kristian Gjøsteen