Navigasjon

  • Hopp til innhold
NTNU Hjemmeside NTNU Hjemmeside

ntnu.no

  • Studier
    • Studere på NTNU
    • Finn studieprogram
    • Søke opptak
    • Videreutdanning og deltid
    • Forkurs og oppfriskning
  • Studentliv
    • Student i Gjøvik
    • Student i Trondheim
    • Student i Ålesund
  • Forskning og innovasjon
    • Forskning
    • Innovasjon
    • Satsingsområder
    • Toppforskning
    • Ekspertlister
    • Ph.d.
  • Om NTNU
    • Fakulteter og institutter
    • Sentre
    • Bibliotek
    • Kart
    • Ledige stillinger
    • Arrangement
    • Nyheter
    • Kontakt oss
    • Om NTNU
  1. Ansatte

Språkvelger

English

Kristian Gjøsteen

Last ned pressefoto
Last ned pressefoto
Foto:

Kristian Gjøsteen

Professor
Institutt for matematiske fag

[email protected]
90748996 Sentralbygg 2, 848, Gløshaugen, Alfred Getz vei 1
Algebragruppen
Om Publikasjoner Undervisning Formidling

Om

Kristian Gjøsteen er professor ved Institutt for matematiske fag. Han er utdannet sivilingeniør og har en doktorgrad fra NTNU. Han tilhører Algebragruppen.

Gjøsteen forsker på kryptografiske valgsystemer, nøkkelutveksling, kryptografi for nettskyen, formelle metoder anvendt på sikkerhetsbevis og personvern. Publikasjoner.

Gjøsteen var med i Regjeringens Digitale Sårbarhetsutvalg (Lysne-utvalget). Han har tidligere jobbet med stemmegivning via internett for Regjeringen (2009-13), og elektroniske identiteter i Norge.
 

Kompetanseord

  • Algebraisk geometri
  • Kommunikasjonsprotokoller
  • Kryptografi

Publikasjoner

  • Kronologisk
  • Etter kategori
  • Se alle publikasjoner i Cristin

2024

  • Dragan, Constantin Catalin; Dupressoir, François; Gjøsteen, Kristian; Haines, Thomas; Rønne, Peter B.; Solberg, Morten Rotvold. (2024) Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2023

  • Gellert, Kai; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2023) On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise. (2023) Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Haines, Thomas; Solberg, Morten Rotvold. (2023) Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Raikwar, Mayank; Wu, Shuang; Gjøsteen, Kristian. (2023) Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand Aga. (2023) Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. Proceedings of the ACM Conference on Computer and Communications Security
    Vitenskapelig artikkel
  • Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian. (2023) Modeling Noise-Accepting Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Solberg, Morten Rotvold; Gjøsteen, Kristian. (2023) Automated theorem provers and their role in cryptography.
    Nettsider (opplysningsmateriale)

2022

  • Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang. (2022) PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian. (2022) Practical Mathematical Cryptography. CRC Press CRC Press
    Lærebok
  • Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.. (2022) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. IEEE Press
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand. (2022) Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2021

  • de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia. (2021) Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor. (2021) Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold. (2021) Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2020

  • Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A.. (2020) Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. (2020) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh. (2020) Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2019

  • Cremers, Cas; Gjøsteen, Kristian; Jager, Tibor; Cohn-Gordon, Katriel. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2018

  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Strand, Martin; Gjøsteen, Kristian; Buan, Aslak Bakke. (2018) Fully homomorphic encryption with applications to electronic voting. Doktoravhandlinger ved NTNU (33)
    Doktorgradsavhandling
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. Association for Computing Machinery (ACM)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Jager, Tibor. (2018) Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2017

  • Galteland, Herman; Gjøsteen, Kristian. (2017) Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Strand, Martin. (2017) A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Association for Computing Machinery (ACM)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2016

  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance . ERCIM News
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Lund, Anders Smedstuen. (2016) An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications
    Vitenskapelig artikkel

2014

  • Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. (2014) Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology
    Vitenskapelig artikkel

2012

  • Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2012) Password-Based Signatures. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2011

  • Thuen, Øystein Øvreås; Gjøsteen, Kristian. (2011) Bilinear Pairings in Cryptography. Doktoravhandlinger ved NTNU (143)
    Doktorgradsavhandling
  • Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. (2011) Farene ved e-valg. Dagbladet
    Kronikk

2010

  • Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Tapir Akademisk Forlag
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

2008

  • Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2007

  • Gjøsteen, Kristian; Hole, Kjell Jørgen. (2007) Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.)
    Kronikk
  • Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2007) Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2006

  • Gjøsteen, Kristian. (2006) A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

2005

  • Gjøsteen, Kristian. (2005) Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

Tidsskriftspublikasjoner

  • Gellert, Kai; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2023) On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise. (2023) Hybrid Group Key Exchange with Application to Constrained Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand Aga. (2023) Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions. Proceedings of the ACM Conference on Computer and Communications Security
    Vitenskapelig artikkel
  • Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian. (2023) Modeling Noise-Accepting Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Müller, Johannes; Rønne, Peter B.; Silde, Tjerand. (2022) Verifiable Decryption in the Head. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • de Kock, Bor; Gjøsteen, Kristian; Veroni, Mattia. (2021) Practical Isogeny-Based Key-Exchange with Optimal Tightness. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Aranha, Diego F.; Baum, Carsten; Gjøsteen, Kristian; Silde, Tjerand; Tunge, Thor. (2021) Lattice-Based Proof of Shuffle and Applications to Electronic Voting. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Haines, Thomas Edmund; Solberg, Morten Rotvold. (2021) Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Rønne, Peter B.; Atashpendar, Arash; Gjøsteen, Kristian; Ryan, Peter Y. A.. (2020) Short Paper: Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Davies, Gareth Thomas; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. (2020) Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2020) Fast and Secure Updatable Encryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Estaji, Ehsan; Haines, Thomas Edmund; Gjøsteen, Kristian; Rønne, Peter; Ryan, Peter Y. A.; Soroush, Najmeh. (2020) Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Cremers, Cas; Gjøsteen, Kristian; Jager, Tibor; Cohn-Gordon, Katriel. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Haines, Thomas Edmund. (2019) A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor. (2019) Highly Efficient Key Exchange Protocols with Optimal Tightness. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao. (2018) Offline Assisted Group Key Exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Security notions for cloud storage and deduplication. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Jager, Tibor. (2018) Practical and tightly-secure digital signatures and authenticated key exchange. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Galteland, Herman; Gjøsteen, Kristian. (2017) Malware, Encryption, and Rerandomization - Everything is Under Attack. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Boyd, Colin Alexander; Davies, Gareth T.; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2016) Using Cryptography to Control Your Data at a Distance . ERCIM News
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Lund, Anders Smedstuen. (2016) An experiment on the security of the Norwegian electronic voting protocol. Annales des télécommunications
    Vitenskapelig artikkel
  • Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René. (2014) Spreading Alerts Quietly and the Subgroup Escape Problem. Journal of Cryptology
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Petrides, George; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Hole, Kjell Jørgen; Gjøsteen, Kristian; Tjøstheim, Thomas; Nestås, Lars Hopland. (2011) Farene ved e-valg. Dagbladet
    Kronikk
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Andova, Suzana; Cremers, Cas; Gjøsteen, Kristian; Mauw, Sjouke; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2008) A framework for compositional verification of security protocols. Information and Computation
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Hole, Kjell Jørgen. (2007) Nettbanken ikke trygg. Aftenposten (morgenutg. : trykt utg.)
    Kronikk
  • Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian; Kråkmo, Lillian. (2007) Universally Composable Signcryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2006) A new security proof for Damgard's ElGamal. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Homomorphic Cryptosystems Based on Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel
  • Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. Lecture Notes in Computer Science (LNCS)
    Vitenskapelig artikkel

Bøker

  • Gjøsteen, Kristian. (2022) Practical Mathematical Cryptography. CRC Press CRC Press
    Lærebok

Del av bok/rapport

  • Dragan, Constantin Catalin; Dupressoir, François; Gjøsteen, Kristian; Haines, Thomas; Rønne, Peter B.; Solberg, Morten Rotvold. (2024) Machine-Checked Proofs of Accountability: How to sElect Who is to Blame. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Haines, Thomas; Solberg, Morten Rotvold. (2023) Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Raikwar, Mayank; Wu, Shuang; Gjøsteen, Kristian. (2023) Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Raikwar, Mayank; Wu, Shuang. (2022) PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument.
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Drăgan, Constantin Cătălin; Dupressoir, François; Estaji, Ehsan; Gjøsteen, Kristian; Haines, Thomas; Ryan, Peter Y. A.. (2022) Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co. IEEE Press
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2018) Definitions for plaintext-existence hiding in cloud storage. Association for Computing Machinery (ACM)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Strand, Martin. (2017) A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. Association for Computing Machinery (ACM)
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2012) Password-Based Signatures. Springer
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
  • Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Tapir Akademisk Forlag
    Vitenskapelig Kapittel/Artikkel/Konferanseartikkel

Rapport

  • Strand, Martin; Gjøsteen, Kristian; Buan, Aslak Bakke. (2018) Fully homomorphic encryption with applications to electronic voting. Doktoravhandlinger ved NTNU (33)
    Doktorgradsavhandling
  • Thuen, Øystein Øvreås; Gjøsteen, Kristian. (2011) Bilinear Pairings in Cryptography. Doktoravhandlinger ved NTNU (143)
    Doktorgradsavhandling

Informasjonsmateriell

  • Solberg, Morten Rotvold; Gjøsteen, Kristian. (2023) Automated theorem provers and their role in cryptography.
    Nettsider (opplysningsmateriale)

Undervisning

Emner

  • MA6202 - Lineær algebra med anvendelser
  • TMA4160 - Kryptografi
  • MA1202 - Lineær algebra med anvendelser
  • MA8206 - Videregående kryptografi
  • TMA4162 - Beregningsorientert algebra

Formidling

2024

  • Faglig foredrag
    Gjøsteen, Kristian. (2024) A framework for analysis of eID schemes. Coerced Debt, Identity Theft, and Financial Exploitation , Rutger’s law school 2024-06-11 - 2024-06-12
  • Faglig foredrag
    Gjøsteen, Kristian. (2024) Får vi lov til å beskytte internett? Hva gjør revisjonen av eIDAS-forordningen?. IDentitet 2024 2024-04-18 - 2024-04-19

2023

  • Faglig foredrag
    Gjøsteen, Kristian; Kjørven, Marte Eidsand. (2023) Tekniske og juridiske krav til sikkerhet i systemer for eID og elektroniske signaturer Særlig om kravet til brukerens enekontroll («sole control»). IDentitet 2023 2023-06-07 - 2023-06-08

2022

  • Faglig foredrag
    Noer Johansen, Silje; Bennin Bratås, Ellen; Stokke, Mira Sofie; Svensson, Amelia Ella; Reiner-Holm, Eivind; Nergård, Gry. (2022) Bruk og misbruk av eID. SODI-prosjektet Seminar , Oslo 2022-03-10 - 2022-03-10
  • Faglig foredrag
    Wærstad, Tone Linn; Omland, Petter; Noer Johansen, Silje; Svensson, Amelia Ella; Bennin Bratås, Ellen; Sein, Karin. (2022) Research Seminar. SODI-prosjektet Research Seminar , Oslo 2022-10-13 - 2022-10-13
  • Intervju
    Gjøsteen, Kristian; Fuchs, Franz Georg; Engesvik, Sara. (2022) Kvantedatamaskiners destruktive potensiale: – Vi må forsikre oss mot at verden ramler sammen . https://www.digi.no/artikler/kvantedatamaskiners-destruktive https://www.digi.no/artikler/kvantedatamaskiners-destruktive [Internett] 2022-08-05

2020

  • Vitenskapelig foredrag
    Strand, Martin; Gjøsteen, Kristian. (2020) Can there be efficient and natural FHE schemes?. CFAIL CFAIL 2020: Conference for failed attempts and insightful losses , Virtuelt 2020-08-15 - 2020-08-15
  • Vitenskapelig foredrag
    wu, shuang; Gjøsteen, Kristian; Boyd, Colin Alexander. (2020) A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract. 2nd Workshop on Formal Methods for Blockchains 2020-07-20 - 2020-07-21

2017

  • Faglig foredrag
    Armknecht, Frederik; Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Toorani, Mohsen. (2017) Side channels in deduplication: trade-offs between leakage and efficiency. ACM ACM Asia Conference on Computer and Communications Security (ASIACCS'17) 2017-04-02 - 2017-04-06
  • Vitenskapelig foredrag
    Boyd, Colin Alexander; Armknecht, Frederik; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen. (2017) Secure Deduplication - Models and Optimization. CRISP – Center for Research in Security and Privacy Distinguished Lectures Series in Cybersecurity , Darmstadt 2017-11-16 -

2016

  • Vitenskapelig foredrag
    Galteland, Herman; Gjøsteen, Kristian. (2016) Malware, Encryption, and Rerandomization - Everything is Under Attack. Mycrypt 2016 2016-12-01 - 2016-12-02

2011

  • Vitenskapelig foredrag
    Petrides, George; Gjøsteen, Kristian; Steine, Asgeir Bertelsen. (2011) A Novel Framework for Protocol Analysis. Xidian University Provable Security , Xi'An 2011-10-16 - 2011-10-18
  • Vitenskapelig foredrag
    Gjøsteen, Kristian; Thuen, Øystein Øvreås. (2011) Password-Based Signatures. EuroPKI 2011 , Leuven 2011-09-15 - 2011-09-16

2010

  • Vitenskapelig foredrag
    Gjøsteen, Kristian; Steine, Asgeir; Petrides, George. (2010) Formal verification of reductions in cryptography. Gjøvik University College Norwegian Information Security Conference 2010 , Gjøvik 2010-11-23 - 2010-11-24

2008

  • Vitenskapelig foredrag
    Gjøsteen, Kristian; Kråkmo, Lillian. (2008) Round-Optimal Blind Signatures from Waters Signatures. Provable Security 2008-10-30 - 2008-11-01
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2008) A Latency-Free Election Scheme. RSA Conference 208 , San Francisco 2008-04-07 - 2008-04-11
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2008) Weaknesses in BankID, a Norwegian PKI substitute deployed by Norwegian banks. EuroPKI 2008 , Trondheim 2008-06-16 - 2008-06-17
  • Populærvitenskapelig foredrag
    Gjøsteen, Kristian. (2008) Hvordan knekke nettbanken?. The Gathering 2008 , Hamar 2008-03-19 - 2008-03-23

2007

  • Vitenskapelig foredrag
    Brown, Daniel R. L.; Gjøsteen, Kristian. (2007) A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. International association for cryptologic research CRYPTO 2007 , Santa Barbara, California 2007-08-19 - 2007-08-23
  • Populærvitenskapelig foredrag
    Gjøsteen, Kristian. (2007) Kryptografi og Minside. Stiftelsen Ungdom og Forskning og Forbundet Unge Forskere Vitenskapskafe , Oslo 2007-01-25 - 2007-01-25

2006

  • Vitenskapelig foredrag
    Andova, Suzana; Gjøsteen, Kristian; Kråkmo, Lillian; Mjølsnes, Stig Frode; Radomirovic, Sasa. (2006) An example of proving UC-realization with formal methods. ACM The 2nd Workshop on Formal and Computational Cryptography FCC 2006 , Venice 2006-07-09 - 2006-07-09

2005

  • Intervju
    Gjøsteen, Kristian; Årnes, André. (2005) Intervju om kryptografi, Her og nå, NRK P1. NRK P1 NRK P1 [Radio] 2005-08-17
  • Intervju
    Gjøsteen, Kristian; Årnes, André. (2005) Kriminelt kryptisk. Gemini Gemini [Avis] 2005-06-01
  • Intervju
    Willassen, Svein Yngvar; Gjøsteen, Kristian. (2005) Kriminelle bruker hemmelige koder. Nettavisen Nettavisen [Internett] 2005-06-14
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) Symmetric Subgroup Membership Problems. International Association for Cryptologic Research 8th International Workshop on Practice and Theory in Public Key Cryptography , Les Diablerets 2005-01-23 - 2005-01-26
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) Homomorphic cryptosystems based on subgroup membership problems. MyCrypt 2005 , Kuala Lumpur 2005-09-28 - 2005-09-30
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) Security Notions for Disk Encryption. ESORICS 2005 , Milano 2005-09-12 - 2005-09-14
  • Vitenskapelig foredrag
    Gjøsteen, Kristian. (2005) En PRF med en nyttig gruppestruktur. Norsk Sikkerhetsmyndighet Norsk Kryptoseminar 2005 , Kolsås 2005-11-07 - 2005-11-08
  • Vitenskapelig foredrag
    Aspnes, James; Diamadi, Zoë; Gjøsteen, Kristian; Peralta, René; Yampolskiy, Aleksandr. (2005) Spreading Alerts Quietly and the Subgroup Escape Problem. International Association for Cryptographic Research AsiaCrypt 2005 , Chennai 2005-12-04 - 2005-12-08

NTNU – Norges teknisk-naturvitenskapelige universitet

  • For ansatte
  • |
  • For studenter
  • |
  • Innsida
  • |
  • Blackboard

Studere

  • Om studier
  • Studieprogram
  • Emner
  • Videreutdanning
  • Karriere

Aktuelt

  • Nyheter
  • Arrangement
  • Jobbe ved NTNU

Om NTNU

  • Om NTNU
  • Bibliotek
  • Strategi
  • Forskning
  • Satsingsområder
  • Innovasjon
  • Organisasjonskart
  • Utdanningskvalitet

Kontakt

  • Kontakt oss
  • Finn ansatte
  • Spør en ekspert
  • Pressekontakter
  • Kart

NTNU i tre byer

  • NTNU i Gjøvik
  • NTNU i Trondheim
  • NTNU i Ålesund

Om nettstedet

  • Bruk av informasjonskapsler
  • Tilgjengelighetserklæring
  • Personvern
  • Ansvarlig redaktør
Facebook Instagram Linkedin Snapchat Tiktok Youtube
Logg inn
NTNU logo
OSZAR »