default search action
Kristian Gjøsteen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i41]Kristian Gjøsteen:
Password-authenticated Key Exchange and Applications. IACR Cryptol. ePrint Arch. 2024: 1057 (2024) - 2023
- [j5]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-checked proofs of privacy against malicious boards for Selene & Co. J. Comput. Secur. 31(5): 469-499 (2023) - [c39]Elsie Mestl Fondevik, Kristian Gjøsteen:
Modeling Noise-Accepting Key Exchange. CBCrypto 2023: 104-124 - [c38]Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. CCS 2023: 1467-1481 - [c37]Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager:
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. CRYPTO (4) 2023: 297-329 - [c36]Constantin Catalin Dragan, François Dupressoir, Kristian Gjøsteen, Thomas Haines, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. ESORICS (3) 2023: 471-491 - [c35]Colin Boyd, Elsie Mestl Fondevik, Kristian Gjøsteen, Lise Millerjord:
Hybrid Group Key Exchange with Application to Constrained Networks. ISC 2023: 455-472 - [c34]Mayank Raikwar, Shuang Wu, Kristian Gjøsteen:
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. NSS 2023: 137-152 - [i40]Kai Gellert, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager:
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. IACR Cryptol. ePrint Arch. 2023: 854 (2023) - [i39]Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. IACR Cryptol. ePrint Arch. 2023: 1102 (2023) - 2022
- [c33]Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter B. Rønne, Tjerand Silde:
Verifiable Decryption in the Head. ACISP 2022: 355-374 - [c32]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. CSF 2022: 335-347 - [c31]Kristian Gjøsteen, Mayank Raikwar, Shuang Wu:
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. CT-RSA 2022: 589-619 - [i38]Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde:
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. IACR Cryptol. ePrint Arch. 2022: 422 (2022) - [i37]Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. IACR Cryptol. ePrint Arch. 2022: 1182 (2022) - 2021
- [c30]Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge:
Lattice-Based Proof of Shuffle and Applications to Electronic Voting. CT-RSA 2021: 227-251 - [i36]Eleanor McMurtry, Xavier Boyen, Chris Culnane, Kristian Gjøsteen, Thomas Haines, Vanessa Teague:
Towards Verifiable Remote Voting with Paper Assurance. CoRR abs/2111.04210 (2021) - [i35]Diego F. Aranha, Carsten Baum, Kristian Gjøsteen, Tjerand Silde, Thor Tunge:
Lattice-Based Proof of Shuffle and Applications to Electronic Voting. IACR Cryptol. ePrint Arch. 2021: 338 (2021) - [i34]Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter B. Rønne, Tjerand Silde:
Verifiable Decryption in the Head. IACR Cryptol. ePrint Arch. 2021: 558 (2021) - 2020
- [c29]Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang:
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security. ACISP 2020: 82-101 - [c28]Colin Boyd, Kristian Gjøsteen, Shuang Wu:
A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. FMBC@CAV 2020: 5:1-5:13 - [c27]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Fast and Secure Updatable Encryption. CRYPTO (1) 2020: 464-493 - [c26]Ehsan Estaji, Thomas Haines, Kristian Gjøsteen, Peter B. Rønne, Peter Y. A. Ryan, Najmeh Soroush:
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. E-VOTE-ID 2020: 50-66 - [c25]Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. NordSec 2020: 92-107 - [c24]Bor de Kock, Kristian Gjøsteen, Mattia Veroni:
Practical Isogeny-Based Key-Exchange with Optimal Tightness. SAC 2020: 451-479 - [i33]Bor de Kock, Kristian Gjøsteen, Mattia Veroni:
Practical Isogeny-Based Key-exchange with Optimal Tightness. IACR Cryptol. ePrint Arch. 2020: 1165 (2020) - [i32]Kristian Gjøsteen, Thomas Haines, Morten Rotvold Solberg:
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme. IACR Cryptol. ePrint Arch. 2020: 1331 (2020)
2010 – 2019
- 2019
- [c23]Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager:
Highly Efficient Key Exchange Protocols with Optimal Tightness. CRYPTO (3) 2019: 767-797 - [c22]Colin Boyd, Kristian Gjøsteen, Clémentine Gritti, Thomas Haines:
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. INDOCRYPT 2019: 250-270 - [i31]Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan:
Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. CoRR abs/1901.02560 (2019) - [i30]Herman Galteland, Kristian Gjøsteen:
Subliminal channels in post-quantum digital signature schemes. IACR Cryptol. ePrint Arch. 2019: 574 (2019) - [i29]Katriel Cohn-Gordon, Cas Cremers, Kristian Gjøsteen, Håkon Jacobsen, Tibor Jager:
Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters. IACR Cryptol. ePrint Arch. 2019: 737 (2019) - [i28]Gareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang:
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. IACR Cryptol. ePrint Arch. 2019: 1409 (2019) - [i27]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
RISE and SHINE: Fast and Secure Updatable Encryption. IACR Cryptol. ePrint Arch. 2019: 1457 (2019) - 2018
- [c21]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. ARES 2018: 41:1-41:7 - [c20]Kristian Gjøsteen, Tibor Jager:
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. CRYPTO (2) 2018: 95-125 - [c19]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. ISC 2018: 268-285 - [c18]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Security Notions for Cloud Storage and Deduplication. ProvSec 2018: 347-365 - [i26]Danilo Gligoroski, Kristian Gjøsteen, Katina Kralevska:
On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields. CoRR abs/1801.06736 (2018) - [i25]Herman Galteland, Kristian Gjøsteen:
Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits. CoRR abs/1808.09237 (2018) - [i24]Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand:
Zero-Knowledge Proof of Decryption for FHE Ciphertexts. IACR Cryptol. ePrint Arch. 2018: 26 (2018) - [i23]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. IACR Cryptol. ePrint Arch. 2018: 114 (2018) - [i22]Kristian Gjøsteen, Tibor Jager:
Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2018: 543 (2018) - [i21]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Definitions for Plaintext-Existence Hiding in Cloud Storage. IACR Cryptol. ePrint Arch. 2018: 748 (2018) - 2017
- [c17]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side Channels in Deduplication: Trade-offs between Leakage and Efficiency. AsiaCCS 2017: 266-274 - [c16]Kristian Gjøsteen, Martin Strand:
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. Financial Cryptography Workshops 2017: 404-418 - [i20]Kristian Gjøsteen, Martin Strand:
A roadmap to fully homomorphic elections: Stronger security, better verifiability. IACR Cryptol. ePrint Arch. 2017: 166 (2017) - [i19]Herman Galteland, Kristian Gjøsteen:
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys. IACR Cryptol. ePrint Arch. 2017: 1007 (2017) - [i18]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani, Håvard Raddum:
Security notions for cloud storage and deduplication. IACR Cryptol. ePrint Arch. 2017: 1208 (2017) - 2016
- [j4]Kristian Gjøsteen, Anders Smedstuen Lund:
An experiment on the security of the Norwegian electronic voting protocol. Ann. des Télécommunications 71(7-8): 299-307 (2016) - [c15]Herman Galteland, Kristian Gjøsteen:
Malware, Encryption, and Rerandomization - Everything Is Under Attack. Mycrypt 2016: 233-251 - [i17]Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani:
Using Cryptography to Control Your Data at a Distance. ERCIM News 2016(106) (2016) - [i16]Kristian Gjøsteen, Martin Strand:
Fully homomorphic encryption must be fat or ugly? IACR Cryptol. ePrint Arch. 2016: 105 (2016) - [i15]Frederik Armknecht, Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Mohsen Toorani:
Side channels in deduplication: trade-offs between leakage and efficiency. IACR Cryptol. ePrint Arch. 2016: 977 (2016) - 2015
- [j3]James Aspnes, Zoë Diamadi, Aleksandr Yampolskiy, Kristian Gjøsteen, René Peralta:
Spreading Alerts Quietly and the Subgroup Escape Problem. J. Cryptol. 28(4): 796-819 (2015) - [i14]Kristian Gjøsteen, Anders Smedstuen Lund:
The Norwegian Internet Voting Protocol: A new Instantiation. IACR Cryptol. ePrint Arch. 2015: 503 (2015) - [i13]Frederik Armknecht, Colin Boyd, Christopher Carr, Kristian Gjøsteen, Angela Jäschke, Christian A. Reuter, Martin Strand:
A Guide to Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2015: 1192 (2015) - 2013
- [c14]Kristian Gjøsteen, George Petrides, Asgeir Steine:
Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get? ACISP 2013: 379-387 - [i12]Kristian Gjøsteen:
Protocol Variants and Electronic Identification. IACR Cryptol. ePrint Arch. 2013: 329 (2013) - [i11]Kristian Gjøsteen:
Partially blind password-based signatures using elliptic curves. IACR Cryptol. ePrint Arch. 2013: 472 (2013) - [i10]Kristian Gjøsteen:
The Norwegian Internet Voting Protocol. IACR Cryptol. ePrint Arch. 2013: 473 (2013) - 2011
- [j2]Kristian Gjøsteen, George Petrides, Asgeir Steine:
A Novel Framework for Protocol Analysis. J. Internet Serv. Inf. Secur. 1(2/3): 89-106 (2011) - [c13]Kristian Gjøsteen, Øystein Thuen:
Password-Based Signatures. EuroPKI 2011: 17-33 - [c12]Kristian Gjøsteen, George Petrides, Asgeir Steine:
A Novel Framework for Protocol Analysis. ProvSec 2011: 340-347 - [c11]Kristian Gjøsteen:
The Norwegian Internet Voting Protocol. VoteID 2011: 1-18 - 2010
- [i9]Kristian Gjøsteen:
Analysis of an internet voting protocol. IACR Cryptol. ePrint Arch. 2010: 380 (2010)
2000 – 2009
- 2008
- [j1]Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. Inf. Comput. 206(2-4): 425-459 (2008) - [c10]Kristian Gjøsteen:
A Latency-Free Election Scheme. CT-RSA 2008: 425-436 - [c9]Kristian Gjøsteen:
Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks. EuroPKI 2008: 196-206 - [c8]Kristian Gjøsteen, Lillian Kråkmo:
Round-Optimal Blind Signatures from Waters Signatures. ProvSec 2008: 112-126 - 2007
- [c7]Daniel R. L. Brown, Kristian Gjøsteen:
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007: 466-481 - [c6]Kristian Gjøsteen, Lillian Kråkmo:
Universally Composable Signcryption. EuroPKI 2007: 346-353 - [i8]Daniel R. L. Brown, Kristian Gjøsteen:
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. IACR Cryptol. ePrint Arch. 2007: 48 (2007) - 2006
- [c5]Kristian Gjøsteen:
A New Security Proof for Damgård's ElGamal. CT-RSA 2006: 150-158 - [i7]Suzana Andova, Cas Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic:
A framework for compositional verification of security protocols. CoRR abs/cs/0611062 (2006) - [i6]Kristian Gjøsteen:
A Latency-Free Election Scheme. IACR Cryptol. ePrint Arch. 2006: 366 (2006) - [i5]Aslak Bakke Buan, Kristian Gjøsteen, Lillian Kråkmo:
Universally Composable Blind Signatures in the Plain Model. IACR Cryptol. ePrint Arch. 2006: 405 (2006) - 2005
- [c4]James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy:
Spreading Alerts Quietly and the Subgroup Escape Problem. ASIACRYPT 2005: 253-272 - [c3]Kristian Gjøsteen:
Security Notions for Disk Encryption. ESORICS 2005: 455-474 - [c2]Kristian Gjøsteen:
Homomorphic Cryptosystems Based on Subgroup Membership Problems. Mycrypt 2005: 314-327 - [c1]Kristian Gjøsteen:
Symmetric Subgroup Membership Problems. Public Key Cryptography 2005: 104-119 - [i4]Kristian Gjøsteen:
Security notions for disk encryption. IACR Cryptol. ePrint Arch. 2005: 83 (2005) - [i3]James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy:
Spreading Alerts Quietly and the Subgroup Escape Problem. IACR Cryptol. ePrint Arch. 2005: 282 (2005) - 2004
- [i2]Kristian Gjøsteen:
A new security proof for Damgård's ElGamal. IACR Cryptol. ePrint Arch. 2004: 362 (2004) - 2003
- [i1]Kristian Gjøsteen:
Homomorphic public-key systems based on subgroup membership problems. IACR Cryptol. ePrint Arch. 2003: 131 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint