BibTeX records: Håkon Jacobsen

download as .bib file

@inproceedings{DBLP:conf/crypto/GellertGJJ23,
  author       = {Kai Gellert and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via
                  Key Confirmation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14084},
  pages        = {297--329},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38551-3\_10},
  doi          = {10.1007/978-3-031-38551-3\_10},
  timestamp    = {Mon, 14 Aug 2023 16:16:26 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GellertGJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GellertGJJ23,
  author       = {Kai Gellert and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  title        = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via
                  Key Confirmation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {854},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/854},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GellertGJJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Cohn-GordonCGJJ19,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Highly Efficient Key Exchange Protocols with Optimal Tightness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {767--797},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_25},
  doi          = {10.1007/978-3-030-26954-8\_25},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Cohn-GordonCGJJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Cohn-GordonCGJJ19,
  author       = {Katriel Cohn{-}Gordon and
                  Cas Cremers and
                  Kristian Gj{\o}steen and
                  H{\aa}kon Jacobsen and
                  Tibor Jager},
  title        = {Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling
                  real-world deployments with theoretically sound parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/737},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Cohn-GordonCGJJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Jacobsen17,
  author       = {H{\aa}kon Jacobsen},
  title        = {A Modular Security Analysis of {EAP} and {IEEE} 802.11},
  school       = {Norwegian University of Science and Technology, Trondheim, Norway},
  year         = {2017},
  url          = {https://hdl.handle.net/11250/2468807},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/phd/basesearch/Jacobsen17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BrzuskaJ17,
  author       = {Chris Brzuska and
                  H{\aa}kon Jacobsen},
  editor       = {Serge Fehr},
  title        = {A Modular Security Analysis of {EAP} and {IEEE} 802.11},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {335--365},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_12},
  doi          = {10.1007/978-3-662-54388-7\_12},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BrzuskaJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaJ17,
  author       = {Chris Brzuska and
                  H{\aa}kon Jacobsen},
  title        = {A Modular Security Analysis of {EAP} and {IEEE} 802.11},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/253},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BrzuskaJS16,
  author       = {Christina Brzuska and
                  H{\aa}kon Jacobsen and
                  Douglas Stebila},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Safely Exporting Keys from Secure Channels - On the Security of {EAP-TLS}
                  and {TLS} Key Exporters},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {670--698},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_26},
  doi          = {10.1007/978-3-662-49890-3\_26},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BrzuskaJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrzuskaJS16,
  author       = {Christina Brzuska and
                  H{\aa}kon Jacobsen and
                  Douglas Stebila},
  title        = {Safely Exporting Keys from Secure Channels: On the security of {EAP-TLS}
                  and {TLS} Key Exporters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {87},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/087},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrzuskaJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/GligoroskiMSJJE14,
  author       = {Danilo Gligoroski and
                  Hristina Mihajloska and
                  Simona Samardjiska and
                  H{\aa}kon Jacobsen and
                  Rune Erlend Jensen and
                  Mohamed El{-}Hadedy},
  editor       = {Karin Bernsmed and
                  Simone Fischer{-}H{\"{u}}bner},
  title        = {{\(\pi\)}-Cipher: Authenticated Encryption for Big Data},
  booktitle    = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o},
                  Norway, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8788},
  pages        = {110--128},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11599-3\_7},
  doi          = {10.1007/978-3-319-11599-3\_7},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nordsec/GligoroskiMSJJE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GligoroskiSJB14,
  author       = {Danilo Gligoroski and
                  Simona Samardjiska and
                  H{\aa}kon Jacobsen and
                  Sergey Bezzateev},
  title        = {McEliece in the world of Escher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {360},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/360},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GligoroskiSJB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ictinnovations/JacobsenSG12,
  author       = {H{\aa}kon Jacobsen and
                  Simona Samardjiska and
                  Danilo Gligoroski},
  editor       = {Smile Markovski and
                  Marjan Gusev},
  title        = {On the Strong and Weak Keys in {MQQ-SIG}},
  booktitle    = {{ICT} Innovations 2012 - Secure and Intelligent Systems, Ohrid, Macedonia,
                  12-15 September, 2012},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {207},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37169-1\_18},
  doi          = {10.1007/978-3-642-37169-1\_18},
  timestamp    = {Mon, 11 Mar 2019 09:22:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ictinnovations/JacobsenSG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics