Follow
Kristian Gjøsteen
Kristian Gjøsteen
Verified email at ntnu.no
Title
Cited by
Cited by
Year
A guide to fully homomorphic encryption
F Armknecht, C Boyd, C Carr, K Gjøsteen, A Jäschke, CA Reuter, ...
Cryptology ePrint Archive, 2015
3582015
The norwegian internet voting protocol
K Gjøsteen
E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012
1832012
A framework for compositional verification of security protocols
S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović
Information and Computation 206 (2-4), 425-459, 2008
892008
Practical and tightly-secure digital signatures and authenticated key exchange
K Gjøsteen, T Jager
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
882018
Fast and secure updatable encryption
C Boyd, GT Davies, K Gjøsteen, Y Jiang
Annual International Cryptology Conference, 464-493, 2020
632020
A security analysis of the NIST SP 800-90 elliptic curve random number generator
DRL Brown, K Gjøsteen
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
542007
Highly efficient key exchange protocols with optimal tightness
K Cohn-Gordon, C Cremers, K Gjøsteen, H Jacobsen, T Jager
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
512019
Comments on Dual-EC-DRBG/NIST SP 800-90, Draft December 2005, March 2006
K Gjøsteen
42*
Side channels in deduplication: Trade-offs between leakage and efficiency
F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani
Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017
382017
A new security proof for Damgård’s ElGamal
K Gjøsteen
Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006
322006
Symmetric subgroup membership problems
K Gjøsteen
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005
282005
Password-based signatures
K Gjøsteen, Ø Thuen
European Public Key Infrastructure Workshop, 17-33, 2011
262011
An experiment on the security of the Norwegian electronic voting protocol
K Gjøsteen, AS Lund
Annals of Telecommunications 71, 299-307, 2016
242016
Security notions for disk encryption
K Gjøsteen
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
232005
Subgroup membership problems and public key cryptosystems
K Gjøsteen
Fakultet for informasjonsteknologi, matematikk og elektroteknikk, 2004
232004
Verifiable mix-nets and distributed decryption for voting from lattice-based assumptions
DF Aranha, C Baum, K Gjøsteen, T Silde
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
212023
Lattice-based proof of shuffle and applications to electronic voting
DF Aranha, C Baum, K Gjøsteen, T Silde, T Tunge
Cryptographers’ Track at the RSA Conference, 227-251, 2021
212021
Homomorphic cryptosystems based on subgroup membership problems
K Gjøsteen
Progress in Cryptology–Mycrypt 2005: First International Conference on …, 2005
212005
Sufficient conditions for composing security protocols
S Andova, CJF Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, ...
Information and Computation, 2007
192007
Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme
PB Rønne, A Atashpendar, K Gjøsteen, PYA Ryan
Financial Cryptography and Data Security: FC 2019 International Workshops …, 2020
182020
The system can't perform the operation now. Try again later.
Articles 1–20