Kristian Gjøsteen
Orcid: 0000-0001-7317-8625
According to our database1,
Kristian Gjøsteen
authored at least 62 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
J. Comput. Secur., 2023
IACR Cryptol. ePrint Arch., 2023
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Network and System Security - 17th International Conference, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Code-Based Cryptography - 11th International Workshop, 2023
2022
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the 2nd Workshop on Formal Methods for Blockchains, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
CoRR, 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits.
CoRR, 2018
On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields.
CoRR, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
Ann. des Télécommunications, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2011
Proceedings of the Public Key Infrastructures, Services and Applications, 2011
2010
2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Public Key Infrastructure, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Public Key Infrastructure, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Progress in Cryptology, 2005
2004
2003
IACR Cryptol. ePrint Arch., 2003