A guide to fully homomorphic encryption F Armknecht, C Boyd, C Carr, K Gjøsteen, A Jäschke, CA Reuter, ... Cryptology ePrint Archive, 2015 | 325 | 2015 |
The norwegian internet voting protocol K Gjøsteen E-Voting and Identity: Third International Conference, VoteID 2011, Tallinn …, 2012 | 176 | 2012 |
A framework for compositional verification of security protocols S Andova, C Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, S Radomirović Information and Computation 206 (2-4), 425-459, 2008 | 88 | 2008 |
Practical and tightly-secure digital signatures and authenticated key exchange K Gjøsteen, T Jager Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 75 | 2018 |
Fast and secure updatable encryption C Boyd, GT Davies, K Gjøsteen, Y Jiang Annual International Cryptology Conference, 464-493, 2020 | 52 | 2020 |
A security analysis of the NIST SP 800-90 elliptic curve random number generator DRL Brown, K Gjøsteen Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007 | 52 | 2007 |
Highly efficient key exchange protocols with optimal tightness K Cohn-Gordon, C Cremers, K Gjøsteen, H Jacobsen, T Jager Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 43 | 2019 |
Comments on Dual-EC-DRBG/NIST SP 800-90, Draft December 2005, March 2006 K Gjøsteen | 41* | |
Side channels in deduplication: Trade-offs between leakage and efficiency F Armknecht, C Boyd, GT Davies, K Gjøsteen, M Toorani Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 35 | 2017 |
A new security proof for Damgård’s ElGamal K Gjøsteen Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA …, 2006 | 32 | 2006 |
Symmetric subgroup membership problems K Gjøsteen Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 28 | 2005 |
An experiment on the security of the Norwegian electronic voting protocol K Gjøsteen, AS Lund Annals of Telecommunications 71, 299-307, 2016 | 25 | 2016 |
Security notions for disk encryption K Gjøsteen Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005 | 25 | 2005 |
Password-based signatures K Gjøsteen, Ø Thuen European Public Key Infrastructure Workshop, 17-33, 2011 | 22 | 2011 |
Subgroup membership problems and public key cryptosystems K Gjøsteen Fakultet for informasjonsteknologi, matematikk og elektroteknikk, 2004 | 21 | 2004 |
Homomorphic cryptosystems based on subgroup membership problems K Gjøsteen Progress in Cryptology–Mycrypt 2005: First International Conference on …, 2005 | 20 | 2005 |
Sufficient conditions for composing security protocols S Andova, CJF Cremers, K Gjøsteen, S Mauw, SF Mjølsnes, ... Information and Computation, 2007 | 18 | 2007 |
Lattice-based proof of shuffle and applications to electronic voting DF Aranha, C Baum, K Gjøsteen, T Silde, T Tunge Cryptographers’ Track at the RSA Conference, 227-251, 2021 | 16 | 2021 |
Practical isogeny-based key-exchange with optimal tightness B de Kock, K Gjøsteen, M Veroni International Conference on Selected Areas in Cryptography, 451-479, 2020 | 16 | 2020 |
Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme PB Rønne, A Atashpendar, K Gjøsteen, PYA Ryan Financial Cryptography and Data Security: FC 2019 International Workshops …, 2020 | 16 | 2020 |