Kristian Gjøsteen
About
Kristian Gjøsteen is a professor at the Department of Mathematical Sciences. He has a MSc and a PhD from NTNU. He belongs to the Algebra Group.
Gjøsteen's research interests include cryptographic voting systems, key exchange protocols, cloud cryptography, formal methods applied to security proofs and privacy. Publication list.
Gjøsteen was a member of the Norwegian Government’s Committee of Digital Vulnerabilities in Society (Lysne-utvalget). He has worked on electronic voting for the Norwegian government (2009-13), as well as electronic identification in Norway.
Competencies
Publications
2025
-
Millerjord, Lise;
Boyd, Colin Alexander;
Gjøsteen, Kristian;
Gligoroski, Danilo;
Mjølsnes, Stig Frode.
(2025)
Key Exchange in a Post Quantum World.
Norges teknisk-naturvitenskapelige universitet
Norges teknisk-naturvitenskapelige universitet
Doctoral dissertation
-
Riisnæs, Rolf;
Mahler, Tobias;
Gjøsteen, Kristian;
Langford, Malcolm;
Wærstad, Tone Linn;
Omland, Lars Petter Halvorsen.
(2025)
Når BankID er nede, stopper Norge.
Feature article
2024
-
Dragan, Constantin Catalin;
Dupressoir, François;
Gjøsteen, Kristian;
Haines, Thomas;
Rønne, Peter B.;
Solberg, Morten Rotvold.
(2024)
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame.
Academic chapter/article/Conference paper
2023
-
Fondevik, Elsie Margrethe Staff Mestl;
Gjøsteen, Kristian.
(2023)
Modeling Noise-Accepting Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Fondevik, Elsie Margrethe Staff Mestl;
Gjøsteen, Kristian;
Millerjord, Lise.
(2023)
Hybrid Group Key Exchange with Application to Constrained Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Aranha, Diego F.;
Baum, Carsten;
Gjøsteen, Kristian;
Silde, Tjerand Aga.
(2023)
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions.
Proceedings of the ACM Conference on Computer and Communications Security
Academic article
-
Raikwar, Mayank;
Wu, Shuang;
Gjøsteen, Kristian.
(2023)
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian;
Haines, Thomas;
Solberg, Morten Rotvold.
(2023)
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study.
Academic chapter/article/Conference paper
-
Gellert, Kai;
Gjøsteen, Kristian;
Jacobsen, Håkon;
Jager, Tibor.
(2023)
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation.
Lecture Notes in Computer Science (LNCS)
Academic article
2022
-
Drăgan, Constantin Cătălin;
Dupressoir, François;
Estaji, Ehsan;
Gjøsteen, Kristian;
Haines, Thomas;
Ryan, Peter Y. A..
(2022)
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian.
(2022)
Practical Mathematical Cryptography.
CRC Press
CRC Press
Textbook
-
Gjøsteen, Kristian;
Raikwar, Mayank;
Wu, Shuang.
(2022)
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian;
Haines, Thomas Edmund;
Müller, Johannes;
Rønne, Peter B.;
Silde, Tjerand.
(2022)
Verifiable Decryption in the Head.
Lecture Notes in Computer Science (LNCS)
Academic article
2021
-
Gjøsteen, Kristian;
Haines, Thomas Edmund;
Solberg, Morten Rotvold.
(2021)
Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Aranha, Diego F.;
Baum, Carsten;
Gjøsteen, Kristian;
Silde, Tjerand;
Tunge, Thor.
(2021)
Lattice-Based Proof of Shuffle and Applications to Electronic Voting.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Kock, Bor de;
Gjøsteen, Kristian;
Veroni, Mattia.
(2021)
Practical Isogeny-Based Key-Exchange with Optimal Tightness.
Lecture Notes in Computer Science (LNCS)
Academic article
2020
-
Estaji, Ehsan;
Haines, Thomas Edmund;
Gjøsteen, Kristian;
Rønne, Peter;
Ryan, Peter Y. A.;
Soroush, Najmeh.
(2020)
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Davies, Gareth Thomas;
Galteland, Herman;
Gjøsteen, Kristian;
Jiang, Yao.
(2020)
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2020)
Fast and Secure Updatable Encryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Rønne, Peter B.;
Atashpendar, Arash;
Gjøsteen, Kristian;
Ryan, Peter Y. A..
(2020)
Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
Lecture Notes in Computer Science (LNCS)
Academic article
2019
-
Cohn-Gordon, Katriel;
Cremers, Cas;
Gjøsteen, Kristian;
Jacobsen, Håkon;
Jager, Tibor.
(2019)
Highly Efficient Key Exchange Protocols with Optimal Tightness.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Gjøsteen, Kristian;
Gritti, Clementine Jeanne Pierrette;
Haines, Thomas Edmund.
(2019)
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Cremers, Cas;
Gjøsteen, Kristian;
Jager, Tibor;
Cohn-Gordon, Katriel.
(2019)
Highly Efficient Key Exchange Protocols with Optimal Tightness.
Lecture Notes in Computer Science (LNCS)
Academic article
2018
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Security notions for cloud storage and deduplication.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2018)
Offline Assisted Group Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Jager, Tibor.
(2018)
Practical and tightly-secure digital signatures and authenticated key exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Strand, Martin;
Gjøsteen, Kristian;
Buan, Aslak Bakke.
(2018)
Fully homomorphic encryption with applications to electronic voting.
Norges teknisk-naturvitenskapelige universitet
Norges teknisk-naturvitenskapelige universitet
Doctoral dissertation
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Definitions for plaintext-existence hiding in cloud storage.
Academic chapter/article/Conference paper
2017
-
Armknecht, Frederik;
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Toorani, Mohsen.
(2017)
Side channels in deduplication: trade-offs between leakage and efficiency.
Academic chapter/article/Conference paper
-
Galteland, Herman;
Gjøsteen, Kristian.
(2017)
Malware, Encryption, and Rerandomization - Everything is Under Attack.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Strand, Martin.
(2017)
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability.
Academic chapter/article/Conference paper
2016
-
Gjøsteen, Kristian;
Lund, Anders Smedstuen.
(2016)
An experiment on the security of the Norwegian electronic voting protocol.
Annales des télécommunications
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth T.;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2016)
Using Cryptography to Control Your Data at a Distance.
ERCIM News
Academic article
2014
-
Aspnes, James;
Diamadi, Zoë;
Yampolskiy, Aleksandr;
Gjøsteen, Kristian;
Peralta, René.
(2014)
Spreading Alerts Quietly and the Subgroup Escape Problem.
Journal of Cryptology
Academic article
2012
-
Gjøsteen, Kristian;
Thuen, Øystein Øvreås.
(2012)
Password-Based Signatures.
Academic chapter/article/Conference paper
2011
-
Gjøsteen, Kristian;
Petrides, George;
Steine, Asgeir Bertelsen.
(2011)
A Novel Framework for Protocol Analysis.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Thuen, Øystein Øvreås;
Gjøsteen, Kristian.
(2011)
Bilinear Pairings in Cryptography.
NTNU
NTNU
Doctoral dissertation
-
Hole, Kjell Jørgen;
Gjøsteen, Kristian;
Tjøstheim, Thomas;
Nestås, Lars Hopland.
(2011)
Farene ved e-valg.
Feature article
2010
-
Gjøsteen, Kristian;
Steine, Asgeir;
Petrides, George.
(2010)
Formal verification of reductions in cryptography.
Academic chapter/article/Conference paper
2008
-
Gjøsteen, Kristian.
(2008)
A Latency-Free Election Scheme.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Andova, Suzana;
Cremers, Cas;
Gjøsteen, Kristian;
Mauw, Sjouke;
Mjølsnes, Stig Frode;
Radomirovic, Sasa.
(2008)
A framework for compositional verification of security protocols.
Information and Computation
Academic article
-
Gjøsteen, Kristian.
(2008)
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Kråkmo, Lillian.
(2008)
Round-Optimal Blind Signatures from Waters Signatures.
Lecture Notes in Computer Science (LNCS)
Academic article
2007
-
Gjøsteen, Kristian;
Hole, Kjell Jørgen.
(2007)
Nettbanken ikke trygg.
Feature article
-
Gjøsteen, Kristian;
Kråkmo, Lillian.
(2007)
Universally Composable Signcryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Brown, Daniel R. L.;
Gjøsteen, Kristian.
(2007)
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
Lecture Notes in Computer Science (LNCS)
Academic article
2006
-
Gjøsteen, Kristian.
(2006)
A new security proof for Damgard's ElGamal.
Lecture Notes in Computer Science (LNCS)
Academic article
2005
-
Gjøsteen, Kristian.
(2005)
Homomorphic Cryptosystems Based on Subgroup Membership Problems.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Aspnes, James;
Diamadi, Zoë;
Gjøsteen, Kristian;
Peralta, René;
Yampolskiy, Aleksandr.
(2005)
Spreading Alerts Quietly and the Subgroup Escape Problem.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian.
(2005)
Security Notions for Disk Encryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian.
(2005)
Symmetric Subgroup Membership Problems.
Lecture Notes in Computer Science (LNCS)
Academic article
Journal publications
-
Riisnæs, Rolf;
Mahler, Tobias;
Gjøsteen, Kristian;
Langford, Malcolm;
Wærstad, Tone Linn;
Omland, Lars Petter Halvorsen.
(2025)
Når BankID er nede, stopper Norge.
Feature article
-
Fondevik, Elsie Margrethe Staff Mestl;
Gjøsteen, Kristian.
(2023)
Modeling Noise-Accepting Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Fondevik, Elsie Margrethe Staff Mestl;
Gjøsteen, Kristian;
Millerjord, Lise.
(2023)
Hybrid Group Key Exchange with Application to Constrained Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Aranha, Diego F.;
Baum, Carsten;
Gjøsteen, Kristian;
Silde, Tjerand Aga.
(2023)
Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions.
Proceedings of the ACM Conference on Computer and Communications Security
Academic article
-
Gellert, Kai;
Gjøsteen, Kristian;
Jacobsen, Håkon;
Jager, Tibor.
(2023)
On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Haines, Thomas Edmund;
Müller, Johannes;
Rønne, Peter B.;
Silde, Tjerand.
(2022)
Verifiable Decryption in the Head.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Haines, Thomas Edmund;
Solberg, Morten Rotvold.
(2021)
Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Aranha, Diego F.;
Baum, Carsten;
Gjøsteen, Kristian;
Silde, Tjerand;
Tunge, Thor.
(2021)
Lattice-Based Proof of Shuffle and Applications to Electronic Voting.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Kock, Bor de;
Gjøsteen, Kristian;
Veroni, Mattia.
(2021)
Practical Isogeny-Based Key-Exchange with Optimal Tightness.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Estaji, Ehsan;
Haines, Thomas Edmund;
Gjøsteen, Kristian;
Rønne, Peter;
Ryan, Peter Y. A.;
Soroush, Najmeh.
(2020)
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Davies, Gareth Thomas;
Galteland, Herman;
Gjøsteen, Kristian;
Jiang, Yao.
(2020)
Cloud-assisted Asynchronous Key Transport with Post-Quantum Security.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2020)
Fast and Secure Updatable Encryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Rønne, Peter B.;
Atashpendar, Arash;
Gjøsteen, Kristian;
Ryan, Peter Y. A..
(2020)
Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Cohn-Gordon, Katriel;
Cremers, Cas;
Gjøsteen, Kristian;
Jacobsen, Håkon;
Jager, Tibor.
(2019)
Highly Efficient Key Exchange Protocols with Optimal Tightness.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Gjøsteen, Kristian;
Gritti, Clementine Jeanne Pierrette;
Haines, Thomas Edmund.
(2019)
A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Cremers, Cas;
Gjøsteen, Kristian;
Jager, Tibor;
Cohn-Gordon, Katriel.
(2019)
Highly Efficient Key Exchange Protocols with Optimal Tightness.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Security notions for cloud storage and deduplication.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Jiang, Yao.
(2018)
Offline Assisted Group Key Exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Jager, Tibor.
(2018)
Practical and tightly-secure digital signatures and authenticated key exchange.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Galteland, Herman;
Gjøsteen, Kristian.
(2017)
Malware, Encryption, and Rerandomization - Everything is Under Attack.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Lund, Anders Smedstuen.
(2016)
An experiment on the security of the Norwegian electronic voting protocol.
Annales des télécommunications
Academic article
-
Boyd, Colin Alexander;
Davies, Gareth T.;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2016)
Using Cryptography to Control Your Data at a Distance.
ERCIM News
Academic article
-
Aspnes, James;
Diamadi, Zoë;
Yampolskiy, Aleksandr;
Gjøsteen, Kristian;
Peralta, René.
(2014)
Spreading Alerts Quietly and the Subgroup Escape Problem.
Journal of Cryptology
Academic article
-
Gjøsteen, Kristian;
Petrides, George;
Steine, Asgeir Bertelsen.
(2011)
A Novel Framework for Protocol Analysis.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Hole, Kjell Jørgen;
Gjøsteen, Kristian;
Tjøstheim, Thomas;
Nestås, Lars Hopland.
(2011)
Farene ved e-valg.
Feature article
-
Gjøsteen, Kristian.
(2008)
A Latency-Free Election Scheme.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Andova, Suzana;
Cremers, Cas;
Gjøsteen, Kristian;
Mauw, Sjouke;
Mjølsnes, Stig Frode;
Radomirovic, Sasa.
(2008)
A framework for compositional verification of security protocols.
Information and Computation
Academic article
-
Gjøsteen, Kristian.
(2008)
Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Kråkmo, Lillian.
(2008)
Round-Optimal Blind Signatures from Waters Signatures.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian;
Hole, Kjell Jørgen.
(2007)
Nettbanken ikke trygg.
Feature article
-
Gjøsteen, Kristian;
Kråkmo, Lillian.
(2007)
Universally Composable Signcryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Brown, Daniel R. L.;
Gjøsteen, Kristian.
(2007)
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian.
(2006)
A new security proof for Damgard's ElGamal.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian.
(2005)
Homomorphic Cryptosystems Based on Subgroup Membership Problems.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Aspnes, James;
Diamadi, Zoë;
Gjøsteen, Kristian;
Peralta, René;
Yampolskiy, Aleksandr.
(2005)
Spreading Alerts Quietly and the Subgroup Escape Problem.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian.
(2005)
Security Notions for Disk Encryption.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Gjøsteen, Kristian.
(2005)
Symmetric Subgroup Membership Problems.
Lecture Notes in Computer Science (LNCS)
Academic article
Books
-
Gjøsteen, Kristian.
(2022)
Practical Mathematical Cryptography.
CRC Press
CRC Press
Textbook
Part of book/report
-
Dragan, Constantin Catalin;
Dupressoir, François;
Gjøsteen, Kristian;
Haines, Thomas;
Rønne, Peter B.;
Solberg, Morten Rotvold.
(2024)
Machine-Checked Proofs of Accountability: How to sElect Who is to Blame.
Academic chapter/article/Conference paper
-
Raikwar, Mayank;
Wu, Shuang;
Gjøsteen, Kristian.
(2023)
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian;
Haines, Thomas;
Solberg, Morten Rotvold.
(2023)
Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study.
Academic chapter/article/Conference paper
-
Drăgan, Constantin Cătălin;
Dupressoir, François;
Estaji, Ehsan;
Gjøsteen, Kristian;
Haines, Thomas;
Ryan, Peter Y. A..
(2022)
Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian;
Raikwar, Mayank;
Wu, Shuang.
(2022)
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument.
Academic chapter/article/Conference paper
-
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Raddum, Håvard;
Toorani, Mohsen.
(2018)
Definitions for plaintext-existence hiding in cloud storage.
Academic chapter/article/Conference paper
-
Armknecht, Frederik;
Boyd, Colin Alexander;
Davies, Gareth Thomas;
Gjøsteen, Kristian;
Toorani, Mohsen.
(2017)
Side channels in deduplication: trade-offs between leakage and efficiency.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian;
Strand, Martin.
(2017)
A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian;
Thuen, Øystein Øvreås.
(2012)
Password-Based Signatures.
Academic chapter/article/Conference paper
-
Gjøsteen, Kristian;
Steine, Asgeir;
Petrides, George.
(2010)
Formal verification of reductions in cryptography.
Academic chapter/article/Conference paper
Report
-
Millerjord, Lise;
Boyd, Colin Alexander;
Gjøsteen, Kristian;
Gligoroski, Danilo;
Mjølsnes, Stig Frode.
(2025)
Key Exchange in a Post Quantum World.
Norges teknisk-naturvitenskapelige universitet
Norges teknisk-naturvitenskapelige universitet
Doctoral dissertation
-
Strand, Martin;
Gjøsteen, Kristian;
Buan, Aslak Bakke.
(2018)
Fully homomorphic encryption with applications to electronic voting.
Norges teknisk-naturvitenskapelige universitet
Norges teknisk-naturvitenskapelige universitet
Doctoral dissertation
-
Thuen, Øystein Øvreås;
Gjøsteen, Kristian.
(2011)
Bilinear Pairings in Cryptography.
NTNU
NTNU
Doctoral dissertation
Teaching
Courses
Outreach
2024
-
LectureGjøsteen, Kristian. (2024) Får vi lov til å beskytte internett? Hva gjør revisjonen av eIDAS-forordningen?. IDentitet 2024 2024-04-18 - 2024-04-19
-
LectureGjøsteen, Kristian. (2024) A framework for analysis of eID schemes. Coerced Debt, Identity Theft, and Financial Exploitation , Rutger’s law school 2024-06-11 - 2024-06-12
2023
-
LectureGjøsteen, Kristian; Kjørven, Marte Eidsand. (2023) Tekniske og juridiske krav til sikkerhet i systemer for eID og elektroniske signaturer Særlig om kravet til brukerens enekontroll («sole control»). IDentitet 2023 2023-06-07 - 2023-06-08
2022
-
LectureWærstad, Tone Linn; Omland, Petter; Johansen, Silje Noer; Svensson, Amelia Ella; Bratås, Ellen Bennin; Sein, Karin. (2022) Research Seminar. Research Seminar , Oslo 2022-10-13 - 2022-10-13
-
LectureJohansen, Silje Noer; Bratås, Ellen Bennin; Stokke, Mira Sofie; Svensson, Amelia Ella; Reiner-Holm, Eivind; Nergård, Gry. (2022) Bruk og misbruk av eID. Seminar , Oslo 2022-03-10 - 2022-03-10
-
InterviewGjøsteen, Kristian; Fuchs, Franz Georg; Engesvik, Sara. (2022) Kvantedatamaskiners destruktive potensiale: – Vi må forsikre oss mot at verden ramler sammen. https://www.digi.no/artikler/kvantedatamaskiners-destruktive https://www.digi.no/artikler/kvantedatamaskiners-destruktive [Internet] 2022-08-05
2020
-
Academic lectureStrand, Martin; Gjøsteen, Kristian. (2020) Can there be efficient and natural FHE schemes?. CFAIL 2020: Conference for failed attempts and insightful losses , Virtuelt 2020-08-15 - 2020-08-15
-
Academic lecturewu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains 2020-07-20 - 2020-07-21
2017
-
LectureArmknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17) 2017-04-02 - 2017-04-06
-
Academic lectureBoyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity , Darmstadt 2017-11-16 -
2016
-
Academic lectureGalteland, Herman; Gjøsteen, Kristian. (2016) Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016 2016-12-01 - 2016-12-02
2011
-
Academic lectureGjøsteen, Kristian; Thuen, Øystein Øvreås. (2011) Password-Based Signatures. EuroPKI 2011 , Leuven 2011-09-15 - 2011-09-16
-
Academic lecturePetrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Provable Security , Xi'An 2011-10-16 - 2011-10-18
2010
-
Academic lectureGjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010 , Gjøvik 2010-11-23 - 2010-11-24
2008
-
LectureGjøsteen, Kristian. (2008) Hvordan knekke nettbanken?. The Gathering 2008 , Hamar 2008-03-19 - 2008-03-23
-
Academic lectureGjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Provable Security 2008-10-30 - 2008-11-01
-
Academic lectureGjøsteen, Kristian. (2008) A Latency-Free Election Scheme. RSA Conference 208 , San Francisco 2008-04-07 - 2008-04-11
-
Academic lectureGjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008 , Trondheim 2008-06-16 - 2008-06-17
2007
-
Lecture
-
Academic lectureBrown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007 , Santa Barbara, California 2007-08-19 - 2007-08-23
2006
-
Academic lectureAndova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2006) An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006 , Venice 2006-07-09 - 2006-07-09
2005
-
InterviewWillassen, Svein Yngvar; Gjøsteen, Kristian. (2005) Kriminelle bruker hemmelige koder. Nettavisen Nettavisen [Internet] 2005-06-14
-
Interview
-
InterviewGjøsteen, Kristian; Årnes, André. (2005) Intervju om kryptografi, Her og nå, NRK P1. NRK P1 NRK P1 [Radio] 2005-08-17
-
Academic lectureGjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. 8th International Workshop on Practice and Theory in Public Key Cryptography , Les Diablerets 2005-01-23 - 2005-01-26
-
Academic lectureAspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. AsiaCrypt 2005 , Chennai 2005-12-04 - 2005-12-08
-
Academic lectureGjøsteen, Kristian. (2005) En PRF med en nyttig gruppestruktur. Norsk Kryptoseminar 2005 , Kolsås 2005-11-07 - 2005-11-08
-
Academic lectureGjøsteen, Kristian. (2005) Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005 , Kuala Lumpur 2005-09-28 - 2005-09-30
-
Academic lectureGjøsteen, Kristian. (2005) Security Notions for Disk Encryption. ESORICS 2005 , Milano 2005-09-12 - 2005-09-14