Kristian Gjøsteen
Bakgrunn og aktiviteter
Kristian Gjøsteen er professor ved Institutt for matematiske fag. Han er utdannet sivilingeniør og har en doktorgrad fra NTNU. Han tilhører Algebragruppen.
Gjøsteen forsker på kryptografiske valgsystemer, nøkkelutveksling, kryptografi for nettskyen, formelle metoder anvendt på sikkerhetsbevis og personvern. Publikasjoner.
Gjøsteen var med i Regjeringens Digitale Sårbarhetsutvalg (Lysne-utvalget). Han har tidligere jobbet med stemmegivning via internett for Regjeringen (2009-13), og elektroniske identiteter i Norge.
Vitenskapelig, faglig og kunstnerisk arbeid
Et utvalg av nyere tidsskriftspublikasjoner, kunstneriske produksjoner, bok, inklusiv bokdeler og rapport-del. Se alle publikasjoner i databasen
Tidsskriftspublikasjoner
- (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). vol. 12170 LNCS.
- (2020) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS). vol. 12248 LNCS.
- (2020) Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS). vol. 12455.
- (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). vol. 11898.
- (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS). vol. 11694 LNCS.
- (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). vol. 11060 LNCS.
- (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). vol. 11192 LNCS.
- (2018) Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS). vol. 10992 LNCS.
- (2017) Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS). vol. 10311.
- (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. vol. 106.
- (2016) An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications.
- (2014) Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology. vol. 28 (4).
- (2011) A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS). vol. 6980.
- (2008) A framework for compositional verification of security protocols. Information and Computation. vol. 206 (2-4).
- (2008) A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS). vol. 4964.
- (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS). vol. 5057.
- (2008) Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS). vol. 5324.
- (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS). vol. 4622.
- (2007) Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS). vol. 4582.
- (2006) A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS). vol. 3860.