Navigasjon

  • Hopp til innhold
NTNU Hjemmeside

ntnu.no

  • Studier
    • Studieprogram
    • Søk opptak
    • Forkurs og oppfriskning
    • Videreutdanning og deltid
    • Studere på NTNU
  • Studentliv
    • Student i Gjøvik
    • Student i Trondheim
    • Student i Ålesund
    • Derfor velger vi NTNU
  • Forskning og innovasjon
    • Forskning
    • Innovasjon
    • Satsingsområder
    • Toppforskning
    • Ekspertlister
    • Ph.d.
  • Om NTNU
    • Fakulteter og institutter
    • Sentre
    • Bibliotek
    • Kart
    • Ledige stillinger
    • Arrangement
    • Nyheter
    • Kontakt oss
    • Om NTNU
  1. Hjem
  2. Ansatte

Språkvelger

English

Kristian Gjøsteen

Kristian Gjøsteen

Professor
Institutt for matematiske fag

kristian.gjosteen@ntnu.no
90748996 Sentralbygg 2, 848, Gløshaugen, Alfred Getz vei 1
Algebragruppen
Om Publikasjoner Undervisning Formidling

Om

Kristian Gjøsteen er professor ved Institutt for matematiske fag. Han er utdannet sivilingeniør og har en doktorgrad fra NTNU. Han tilhører Algebragruppen.

Gjøsteen forsker på kryptografiske valgsystemer, nøkkelutveksling, kryptografi for nettskyen, formelle metoder anvendt på sikkerhetsbevis og personvern. Publikasjoner.

Gjøsteen var med i Regjeringens Digitale Sårbarhetsutvalg (Lysne-utvalget). Han har tidligere jobbet med stemmegivning via internett for Regjeringen (2009-13), og elektroniske identiteter i Norge.
 

Kompetanseord

  • Algebra/algebraisk analyse
  • Algebraisk geometri
  • Kommunikasjonsprotokoller
  • Kryptografi
  • Sikkerhet og sårbarhet

Publikasjoner

  • Kronologisk
  • Etter kategori
  • Se alle publikasjoner i Cristin

2022

  • Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.; Rønne, Peter B.; Solberg, Morten Rotvold. (2022) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 2022 IEEE 35th Computer Security Foundations Symposium (CSF).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian. (2022) Practical Mathematical Cryptography. CRC Press. 2022. ISBN 9780367710859.
    Lærebok
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand. (2022) Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS). volum 13494.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang. (2022) PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. Topics in Cryptology – CT-RSA 2022.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2021

  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor. (2021) Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS). volum 12704.
    Vitenskapelig artikkel
  • de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia. (2021) Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 12804.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold. (2021) Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS). volum 12556.
    Vitenskapelig artikkel

2020

  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). volum 12170 LNCS.
    Vitenskapelig artikkel
  • Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. (2020) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS). volum 12248 LNCS.
    Vitenskapelig artikkel
  • Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh. (2020) Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS). volum 12455.
    Vitenskapelig artikkel
  • Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A.. (2020) Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS). volum 11599.
    Vitenskapelig artikkel

2019

  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). volum 11898.
    Vitenskapelig artikkel
  • Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 11694 LNCS.
    Vitenskapelig artikkel

2018

  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). volum 11060 LNCS.
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). volum 11192 LNCS.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Jager, Tibor. (2018) Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS). volum 10992 LNCS.
    Vitenskapelig artikkel

2017

  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Galteland, Herman; Gjøsteen, Kristian. (2017) Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS). volum 10311.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Strand, Martin. (2017) A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2016

  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. volum 106.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Lund, Anders Smedstuen. (2016) An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications.
    Vitenskapelig artikkel

2014

  • Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. (2014) Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology. volum 28 (4).
    Vitenskapelig artikkel

2012

  • Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2012) Password-Based Signatures. Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2011

  • Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS). volum 6980.
    Vitenskapelig artikkel
  • Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. (2011) Farene ved e-valg. Dagbladet.
    Kronikk

2010

  • Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2008

  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation. volum 206 (2-4).
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS). volum 4964.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS). volum 5057.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS). volum 5324.
    Vitenskapelig artikkel

2007

  • Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS). volum 4622.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Hole, Kjell Jørgen. (2007) Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.).
    Kronikk
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2007) Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS). volum 4582.
    Vitenskapelig artikkel

2006

  • Gjøsteen, Kristian. (2006) A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS). volum 3860.
    Vitenskapelig artikkel

2005

  • Gjøsteen, Kristian. (2005) Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3715.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS). volum 3679.
    Vitenskapelig artikkel
  • Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. Lecture Notes in Computer Science (LNCS). volum 3788.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3386.
    Vitenskapelig artikkel

Tidsskriftspublikasjoner

  • Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand. (2022) Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS). volum 13494.
    Vitenskapelig artikkel
  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor. (2021) Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS). volum 12704.
    Vitenskapelig artikkel
  • de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia. (2021) Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 12804.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold. (2021) Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS). volum 12556.
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). volum 12170 LNCS.
    Vitenskapelig artikkel
  • Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. (2020) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS). volum 12248 LNCS.
    Vitenskapelig artikkel
  • Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh. (2020) Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS). volum 12455.
    Vitenskapelig artikkel
  • Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A.. (2020) Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS). volum 11599.
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). volum 11898.
    Vitenskapelig artikkel
  • Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 11694 LNCS.
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). volum 11060 LNCS.
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). volum 11192 LNCS.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Jager, Tibor. (2018) Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS). volum 10992 LNCS.
    Vitenskapelig artikkel
  • Galteland, Herman; Gjøsteen, Kristian. (2017) Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS). volum 10311.
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. volum 106.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Lund, Anders Smedstuen. (2016) An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications.
    Vitenskapelig artikkel
  • Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. (2014) Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology. volum 28 (4).
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS). volum 6980.
    Vitenskapelig artikkel
  • Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. (2011) Farene ved e-valg. Dagbladet.
    Kronikk
  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation. volum 206 (2-4).
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS). volum 4964.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS). volum 5057.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS). volum 5324.
    Vitenskapelig artikkel
  • Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS). volum 4622.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Hole, Kjell Jørgen. (2007) Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.).
    Kronikk
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2007) Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS). volum 4582.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2006) A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS). volum 3860.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3715.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS). volum 3679.
    Vitenskapelig artikkel
  • Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. Lecture Notes in Computer Science (LNCS). volum 3788.
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3386.
    Vitenskapelig artikkel

Bøker

  • Gjøsteen, Kristian. (2022) Practical Mathematical Cryptography. CRC Press. 2022. ISBN 9780367710859.
    Lærebok

Del av bok/rapport

  • Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.; Rønne, Peter B.; Solberg, Morten Rotvold. (2022) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 2022 IEEE 35th Computer Security Foundations Symposium (CSF).
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang. (2022) PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. Topics in Cryptology – CT-RSA 2022.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Strand, Martin. (2017) A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2012) Password-Based Signatures. Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Undervisning

Emner

  • MA6202 - Lineær algebra med anvendelser
  • MA1202 - Lineær algebra med anvendelser
  • MA8206 - Videregående kryptografi
  • TMA4162 - Beregningsorientert algebra
  • TMA4185 - Kodeteori

Formidling

2022

  • Intervju
    Gjøsteen, Kristian; Fuchs, Franz Georg; Engesvik, Sara. (2022) Kvantedatamaskiners destruktive potensiale: – Vi må forsikre oss mot at verden ramler sammen. https://www.digi.no/artikler/kvantedatamaskiners-destruktive [Internett]. 2022-08-05.

2020

  • Vitenskapelig foredrag
    Strand, Martin; Gjøsteen, Kristian. (2020) Can there be efficient and natural FHE schemes?. CFAIL 2020: Conference for failed attempts and insightful losses . CFAIL; Virtuelt. 2020-08-15 - 2020-08-15.
  • Vitenskapelig foredrag
    wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains ; 2020-07-20 - 2020-07-21.

2017

  • Faglig foredrag
    Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17) . ACM; 2017-04-02 - 2017-04-06.
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity . CRISP – Center for Research in Security and Privacy; Darmstadt. 2017-11-16.

2016

  • Vitenskapelig foredrag
    Galteland, Herman; Gjøsteen, Kristian. (2016) Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016 ; 2016-12-01 - 2016-12-02.

2011

  • Vitenskapelig foredrag
    Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2011) Password-Based Signatures. EuroPKI 2011 ; Leuven. 2011-09-15 - 2011-09-16.
  • Vitenskapelig foredrag
    Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Provable Security . Xidian University; Xi'An. 2011-10-16 - 2011-10-18.

2010

  • Vitenskapelig foredrag
    Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010 . Gjøvik University College; Gjøvik. 2010-11-23 - 2010-11-24.

2008

  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. RSA Conference 208 ; San Francisco. 2008-04-07 - 2008-04-11.
  • Populærvitenskapelig foredrag
    Gjøsteen, Kristian. (2008) Hvordan knekke nettbanken?. The Gathering 2008 ; Hamar. 2008-03-19 - 2008-03-23.
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008 ; Trondheim. 2008-06-16 - 2008-06-17.
  • Vitenskapelig foredrag
    Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Provable Security ; 2008-10-30 - 2008-11-01.

2007

  • Vitenskapelig foredrag
    Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007 . International association for cryptologic research; Santa Barbara, California. 2007-08-19 - 2007-08-23.
  • Populærvitenskapelig foredrag
    Gjøsteen, Kristian. (2007) Kryptografi og Minside. Vitenskapskafe . Stiftelsen Ungdom og Forskning og Forbundet Unge Forskere; Oslo. 2007-01-25 - 2007-01-25.

2006

  • Vitenskapelig foredrag
    Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2006) An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006 . ACM; Venice. 2006-07-09 - 2006-07-09.

2005

  • Vitenskapelig foredrag
    Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. AsiaCrypt 2005 . International Association for Cryptographic Research; Chennai. 2005-12-04 - 2005-12-08.
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) En PRF med en nyttig gruppestruktur. Norsk Kryptoseminar 2005 . Norsk Sikkerhetsmyndighet; Kolsås. 2005-11-07 - 2005-11-08.
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005 ; Kuala Lumpur. 2005-09-28 - 2005-09-30.
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. ESORICS 2005 ; Milano. 2005-09-12 - 2005-09-14.
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. 8th International Workshop on Practice and Theory in Public Key Cryptography . International Association for Cryptologic Research; Les Diablerets. 2005-01-23 - 2005-01-26.
  • Intervju
    Gjøsteen, Kristian; Årnes, André. (2005) Intervju om kryptografi, Her og nå, NRK P1. NRK P1 [Radio]. 2005-08-17.
  • Intervju
    Gjøsteen, Kristian; Årnes, André. (2005) Kriminelt kryptisk. Gemini [Avis]. 2005-06-01.
  • Intervju
    Willassen, Svein Yngvar; Gjøsteen, Kristian. (2005) Kriminelle bruker hemmelige koder. Nettavisen [Internett]. 2005-06-14.
NTNU kunnsap for en bedre verden
Studere
  • Studieprogram
  • Emner
  • Videreutdanning og deltid
  • Jobbmuligheter
  • Karriereutvikling
  • Studentaktiviteter
  • Studentblogger
  • Hvorfor velge NTNU
Kontakt
  • Kontakt oss
  • Finn ansatte
  • Skolebesøk og messer
  • Spør en ekspert
  • For alumni
  • Pressekontakter
Oppdag NTNU
  • Arrangement
  • Jobbe ved NTNU
  • Bilder og video
  • Nyheter
  • Kart
  • NTNU i Gjøvik
  • NTNU i Trondheim
  • NTNU i Ålesund
Om NTNU
  • Strategi
  • Forskning
  • Satsingsområder
  • Innovasjon
  • Utdanningskvalitet
  • Organisasjonskart
  • Om NTNU
Tjenester
  • For ansatte
  • For studenter
  • Blackboard
  • Innsida

Norges teknisk-naturvitenskapelige universitet

Bruk av informasjonskapsler
Tilgjengelighetserklæring
Personvern
Ansvarlig redaktør
Logg inn