Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Håkon Jacobsen
@inproceedings{DBLP:conf/crypto/GellertGJJ23, author = {Kai Gellert and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14084}, pages = {297--329}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38551-3\_10}, doi = {10.1007/978-3-031-38551-3\_10}, timestamp = {Mon, 14 Aug 2023 16:16:26 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GellertGJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GellertGJJ23, author = {Kai Gellert and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, title = {On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {854}, year = {2023}, url = {https://eprint.iacr.org/2023/854}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GellertGJJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Cohn-GordonCGJJ19, author = {Katriel Cohn{-}Gordon and Cas Cremers and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Highly Efficient Key Exchange Protocols with Optimal Tightness}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {767--797}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_25}, doi = {10.1007/978-3-030-26954-8\_25}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Cohn-GordonCGJJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Cohn-GordonCGJJ19, author = {Katriel Cohn{-}Gordon and Cas Cremers and Kristian Gj{\o}steen and H{\aa}kon Jacobsen and Tibor Jager}, title = {Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2019}, url = {https://eprint.iacr.org/2019/737}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Cohn-GordonCGJJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Jacobsen17, author = {H{\aa}kon Jacobsen}, title = {A Modular Security Analysis of {EAP} and {IEEE} 802.11}, school = {Norwegian University of Science and Technology, Trondheim, Norway}, year = {2017}, url = {https://hdl.handle.net/11250/2468807}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/basesearch/Jacobsen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BrzuskaJ17, author = {Chris Brzuska and H{\aa}kon Jacobsen}, editor = {Serge Fehr}, title = {A Modular Security Analysis of {EAP} and {IEEE} 802.11}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {335--365}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_12}, doi = {10.1007/978-3-662-54388-7\_12}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BrzuskaJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaJ17, author = {Chris Brzuska and H{\aa}kon Jacobsen}, title = {A Modular Security Analysis of {EAP} and {IEEE} 802.11}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2017}, url = {http://eprint.iacr.org/2017/253}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BrzuskaJS16, author = {Christina Brzuska and H{\aa}kon Jacobsen and Douglas Stebila}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Safely Exporting Keys from Secure Channels - On the Security of {EAP-TLS} and {TLS} Key Exporters}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {670--698}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_26}, doi = {10.1007/978-3-662-49890-3\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BrzuskaJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrzuskaJS16, author = {Christina Brzuska and H{\aa}kon Jacobsen and Douglas Stebila}, title = {Safely Exporting Keys from Secure Channels: On the security of {EAP-TLS} and {TLS} Key Exporters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {87}, year = {2016}, url = {http://eprint.iacr.org/2016/087}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrzuskaJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nordsec/GligoroskiMSJJE14, author = {Danilo Gligoroski and Hristina Mihajloska and Simona Samardjiska and H{\aa}kon Jacobsen and Rune Erlend Jensen and Mohamed El{-}Hadedy}, editor = {Karin Bernsmed and Simone Fischer{-}H{\"{u}}bner}, title = {{\(\pi\)}-Cipher: Authenticated Encryption for Big Data}, booktitle = {Secure {IT} Systems - 19th Nordic Conference, NordSec 2014, Troms{\o}, Norway, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8788}, pages = {110--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11599-3\_7}, doi = {10.1007/978-3-319-11599-3\_7}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nordsec/GligoroskiMSJJE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GligoroskiSJB14, author = {Danilo Gligoroski and Simona Samardjiska and H{\aa}kon Jacobsen and Sergey Bezzateev}, title = {McEliece in the world of Escher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {360}, year = {2014}, url = {http://eprint.iacr.org/2014/360}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GligoroskiSJB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictinnovations/JacobsenSG12, author = {H{\aa}kon Jacobsen and Simona Samardjiska and Danilo Gligoroski}, editor = {Smile Markovski and Marjan Gusev}, title = {On the Strong and Weak Keys in {MQQ-SIG}}, booktitle = {{ICT} Innovations 2012 - Secure and Intelligent Systems, Ohrid, Macedonia, 12-15 September, 2012}, series = {Advances in Intelligent Systems and Computing}, volume = {207}, pages = {183--193}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37169-1\_18}, doi = {10.1007/978-3-642-37169-1\_18}, timestamp = {Mon, 11 Mar 2019 09:22:14 +0100}, biburl = {https://dblp.org/rec/conf/ictinnovations/JacobsenSG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.