Navigation

  • Skip to Content
NTNU Home

ntnu.edu

  • Studies
    • Master's programmes in English
    • For exchange students
    • PhD opportunities
    • All programmes of study
    • Courses
    • Financing
    • Language requirements
    • Application process
    • Academic calendar
    • FAQ
  • Research and innovation
    • NTNU research
    • Research excellence
    • Strategic research areas
    • Innovation resources
    • PhD opportunities
  • Life and housing
    • Student in Trondheim
    • Student in Gjøvik
    • Student in Ålesund
    • For researchers
    • Life and housing
  • About NTNU
    • Contact us
    • Faculties and departments
    • Libraries
    • International researcher support
    • Vacancies
    • About NTNU
    • Maps
  1. Employees

Språkvelger

Norsk

Kristian Gjøsteen

Kristian Gjøsteen

Professor
Department of Mathematical Sciences

kristian.gjosteen@ntnu.no
+4790748996 Sentralbygg 2, 848, Gløshaugen, Alfred Getz vei 1
Algebragruppen
About Publications Teaching Media

About

Kristian Gjøsteen is a professor at the Department of Mathematical Sciences. He has a MSc and a PhD  from NTNU. He belongs to the Algebra Group.
 
Gjøsteen's research interests include cryptographic voting systems, key exchange protocols, cloud cryptography, formal methods applied to security proofs and privacy. Publication list.
 
Gjøsteen was a member of the Norwegian Government’s Committee of Digital Vulnerabilities in Society (Lysne-utvalget). He has worked on electronic voting for the Norwegian government (2009-13), as well as electronic identification in Norway.

Competencies

  • Algebra/algebraic analysis
  • Algebraic geometry
  • Communication protocols
  • Cryptography
  • Security and vulnerability

Publications

  • Chronological
  • By category
  • See all publications in Cristin

2023

  • Solberg, Morten Rotvold; Gjøsteen, Kristian. (2023) Automated theorem provers and their role in cryptography.
    Website (informational material)

2022

  • Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.; Rønne, Peter B.; Solberg, Morten Rotvold. (2022) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 2022 IEEE 35th Computer Security Foundations Symposium (CSF).
    Academic chapter/article/Conference paper
  • Gjøsteen, Kristian. (2022) Practical Mathematical Cryptography. CRC Press. 2022. ISBN 9780367710859.
    Textbook
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand. (2022) Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS). volum 13494.
    Academic article
  • Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang. (2022) PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. Topics in Cryptology – CT-RSA 2022.
    Academic chapter/article/Conference paper

2021

  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor. (2021) Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS). volum 12704.
    Academic article
  • de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia. (2021) Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 12804.
    Academic article
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold. (2021) Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS). volum 12556.
    Academic article

2020

  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). volum 12170 LNCS.
    Academic article
  • Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. (2020) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS). volum 12248 LNCS.
    Academic article
  • Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh. (2020) Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS). volum 12455.
    Academic article
  • Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A.. (2020) Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS). volum 11599.
    Academic article

2019

  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). volum 11898.
    Academic article
  • Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 11694 LNCS.
    Academic article

2018

  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). volum 11060 LNCS.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018.
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). volum 11192 LNCS.
    Academic article
  • Gjøsteen, Kristian; Jager, Tibor. (2018) Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS). volum 10992 LNCS.
    Academic article

2017

  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
    Academic chapter/article/Conference paper
  • Galteland, Herman; Gjøsteen, Kristian. (2017) Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS). volum 10311.
    Academic article
  • Gjøsteen, Kristian; Strand, Martin. (2017) A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers.
    Academic chapter/article/Conference paper

2016

  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. volum 106.
    Academic article
  • Gjøsteen, Kristian; Lund, Anders Smedstuen. (2016) An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications.
    Academic article

2014

  • Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. (2014) Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology. volum 28 (4).
    Academic article

2012

  • Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2012) Password-Based Signatures. Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers.
    Academic chapter/article/Conference paper

2011

  • Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS). volum 6980.
    Academic article
  • Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. (2011) Farene ved e-valg. Dagbladet.
    Feature article

2010

  • Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010.
    Academic chapter/article/Conference paper

2008

  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation. volum 206 (2-4).
    Academic article
  • Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS). volum 4964.
    Academic article
  • Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS). volum 5057.
    Academic article
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS). volum 5324.
    Academic article

2007

  • Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS). volum 4622.
    Academic article
  • Gjøsteen, Kristian; Hole, Kjell Jørgen. (2007) Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.).
    Feature article
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2007) Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS). volum 4582.
    Academic article

2006

  • Gjøsteen, Kristian. (2006) A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS). volum 3860.
    Academic article

2005

  • Gjøsteen, Kristian. (2005) Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3715.
    Academic article
  • Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS). volum 3679.
    Academic article
  • Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. Lecture Notes in Computer Science (LNCS). volum 3788.
    Academic article
  • Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3386.
    Academic article

Journal publications

  • Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand. (2022) Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS). volum 13494.
    Academic article
  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor. (2021) Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS). volum 12704.
    Academic article
  • de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia. (2021) Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 12804.
    Academic article
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold. (2021) Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS). volum 12556.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS). volum 12170 LNCS.
    Academic article
  • Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. (2020) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS). volum 12248 LNCS.
    Academic article
  • Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh. (2020) Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS). volum 12455.
    Academic article
  • Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A.. (2020) Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS). volum 11599.
    Academic article
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS). volum 11898.
    Academic article
  • Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS). volum 11694 LNCS.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS). volum 11060 LNCS.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS). volum 11192 LNCS.
    Academic article
  • Gjøsteen, Kristian; Jager, Tibor. (2018) Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS). volum 10992 LNCS.
    Academic article
  • Galteland, Herman; Gjøsteen, Kristian. (2017) Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS). volum 10311.
    Academic article
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance. ERCIM News. volum 106.
    Academic article
  • Gjøsteen, Kristian; Lund, Anders Smedstuen. (2016) An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications.
    Academic article
  • Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. (2014) Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology. volum 28 (4).
    Academic article
  • Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS). volum 6980.
    Academic article
  • Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. (2011) Farene ved e-valg. Dagbladet.
    Feature article
  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation. volum 206 (2-4).
    Academic article
  • Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS). volum 4964.
    Academic article
  • Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS). volum 5057.
    Academic article
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS). volum 5324.
    Academic article
  • Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS). volum 4622.
    Academic article
  • Gjøsteen, Kristian; Hole, Kjell Jørgen. (2007) Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.).
    Feature article
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2007) Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS). volum 4582.
    Academic article
  • Gjøsteen, Kristian. (2006) A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS). volum 3860.
    Academic article
  • Gjøsteen, Kristian. (2005) Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3715.
    Academic article
  • Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS). volum 3679.
    Academic article
  • Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. Lecture Notes in Computer Science (LNCS). volum 3788.
    Academic article
  • Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS). volum 3386.
    Academic article

Books

  • Gjøsteen, Kristian. (2022) Practical Mathematical Cryptography. CRC Press. 2022. ISBN 9780367710859.
    Textbook

Part of book/report

  • Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.; Rønne, Peter B.; Solberg, Morten Rotvold. (2022) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. 2022 IEEE 35th Computer Security Foundations Symposium (CSF).
    Academic chapter/article/Conference paper
  • Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang. (2022) PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument. Topics in Cryptology – CT-RSA 2022.
    Academic chapter/article/Conference paper
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. ARES'18. Proceedings of The 13th International Conference on Availability, Reliability and Security - Hamburg, Germany — August 27 - 30, 2018.
    Academic chapter/article/Conference paper
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security.
    Academic chapter/article/Conference paper
  • Gjøsteen, Kristian; Strand, Martin. (2017) A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. Financial Cryptography and Data Security -- FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers.
    Academic chapter/article/Conference paper
  • Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2012) Password-Based Signatures. Public Key Infrastructures, Services and Applications : 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers.
    Academic chapter/article/Conference paper
  • Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Norwegian Information Security Conference = Norsk Informasjonssikkerhetskonferanse : NISK 2010 . Gjøvik University College, Gjøvik, 23-24 November 2010.
    Academic chapter/article/Conference paper

INFORMASJONSMATR

  • Solberg, Morten Rotvold; Gjøsteen, Kristian. (2023) Automated theorem provers and their role in cryptography.
    Website (informational material)

Teaching

Courses

  • MA6202 - Linear Algebra with Applications
  • MA3201 - Rings and Modules
  • MA8206 - Advanced Cryptography
  • MA1202 - Linear Algebra with Applications
  • TMA4162 - Computational Algebra

Media

2022

  • Interview
    Gjøsteen, Kristian; Fuchs, Franz Georg; Engesvik, Sara. (2022) Kvantedatamaskiners destruktive potensiale: – Vi må forsikre oss mot at verden ramler sammen. https://www.digi.no/artikler/kvantedatamaskiners-destruktive [Internett]. 2022-08-05.

2020

  • Academic lecture
    Strand, Martin; Gjøsteen, Kristian. (2020) Can there be efficient and natural FHE schemes?. CFAIL 2020: Conference for failed attempts and insightful losses . CFAIL; Virtuelt. 2020-08-15 - 2020-08-15.
  • Academic lecture
    wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains ; 2020-07-20 - 2020-07-21.

2017

  • Lecture
    Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM Asia Conference on Computer and Communications Security (ASIACCS'17) . ACM; 2017-04-02 - 2017-04-06.
  • Academic lecture
    Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. Distinguished Lectures Series in Cybersecurity . CRISP – Center for Research in Security and Privacy; Darmstadt. 2017-11-16.

2016

  • Academic lecture
    Galteland, Herman; Gjøsteen, Kristian. (2016) Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016 ; 2016-12-01 - 2016-12-02.

2011

  • Academic lecture
    Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2011) Password-Based Signatures. EuroPKI 2011 ; Leuven. 2011-09-15 - 2011-09-16.
  • Academic lecture
    Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Provable Security . Xidian University; Xi'An. 2011-10-16 - 2011-10-18.

2010

  • Academic lecture
    Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Norwegian Information Security Conference 2010 . Gjøvik University College; Gjøvik. 2010-11-23 - 2010-11-24.

2008

  • Academic lecture
    Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. RSA Conference 208 ; San Francisco. 2008-04-07 - 2008-04-11.
  • Popular scientific lecture
    Gjøsteen, Kristian. (2008) Hvordan knekke nettbanken?. The Gathering 2008 ; Hamar. 2008-03-19 - 2008-03-23.
  • Academic lecture
    Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008 ; Trondheim. 2008-06-16 - 2008-06-17.
  • Academic lecture
    Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Provable Security ; 2008-10-30 - 2008-11-01.

2007

  • Academic lecture
    Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. CRYPTO 2007 . International association for cryptologic research; Santa Barbara, California. 2007-08-19 - 2007-08-23.
  • Popular scientific lecture
    Gjøsteen, Kristian. (2007) Kryptografi og Minside. Vitenskapskafe . Stiftelsen Ungdom og Forskning og Forbundet Unge Forskere; Oslo. 2007-01-25 - 2007-01-25.

2006

  • Academic lecture
    Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2006) An example of proving UC-realization with formal methods. The 2nd Workshop on Formal and Computational Cryptography FCC 2006 . ACM; Venice. 2006-07-09 - 2006-07-09.

2005

  • Academic lecture
    Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. AsiaCrypt 2005 . International Association for Cryptographic Research; Chennai. 2005-12-04 - 2005-12-08.
  • Academic lecture
    Gjøsteen, Kristian. (2005) En PRF med en nyttig gruppestruktur. Norsk Kryptoseminar 2005 . Norsk Sikkerhetsmyndighet; Kolsås. 2005-11-07 - 2005-11-08.
  • Academic lecture
    Gjøsteen, Kristian. (2005) Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005 ; Kuala Lumpur. 2005-09-28 - 2005-09-30.
  • Academic lecture
    Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. ESORICS 2005 ; Milano. 2005-09-12 - 2005-09-14.
  • Academic lecture
    Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. 8th International Workshop on Practice and Theory in Public Key Cryptography . International Association for Cryptologic Research; Les Diablerets. 2005-01-23 - 2005-01-26.
  • Interview
    Gjøsteen, Kristian; Årnes, André. (2005) Intervju om kryptografi, Her og nå, NRK P1. NRK P1 [Radio]. 2005-08-17.
  • Interview
    Gjøsteen, Kristian; Årnes, André. (2005) Kriminelt kryptisk. Gemini [Avis]. 2005-06-01.
  • Interview
    Willassen, Svein Yngvar; Gjøsteen, Kristian. (2005) Kriminelle bruker hemmelige koder. Nettavisen [Internett]. 2005-06-14.
NTNU
Studies
  • Master's programmes in English
  • For exchange students
  • PhD opportunities
  • Courses
  • Career development
  • Continuing education
  • Application process
Contact
  • Contact NTNU
  • Employees
  • For alumni
  • Press contacts
  • Researcher support
Discover NTNU
  • Experts
  • Vacancies
  • Pictures from NTNU
  • Innovation resources
  • NTNU in Gjøvik
  • NTNU in Trondheim
  • NTNU in Ålesund
  • Maps
About NTNU
  • NTNU's strategy
  • Research excellence
  • Strategic research areas
  • Organizational chart
  • Libraries
  • About the university
Services
  • For employees
  • For students
  • Blackboard
  • Intranet

Norwegian University of Science and Technology

Use of cookies
Accessibility statement (in Norwegian)
Privacy policy
Editoral responsibility
Sign In