|
Search the dblp DataBase
Kristian Gjøsteen:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- James Aspnes, Zoë Diamadi, Kristian Gjøsteen, René Peralta, Aleksandr Yampolskiy
Spreading Alerts Quietly and the Subgroup Escape Problem. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:253-272 [Conf]
- Kristian Gjøsteen
A New Security Proof for Damgård's ElGamal. [Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:150-158 [Conf]
- Kristian Gjøsteen
Security Notions for Disk Encryption. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:455-474 [Conf]
- Kristian Gjøsteen
Homomorphic Cryptosystems Based on Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:314-327 [Conf]
- Kristian Gjøsteen
Symmetric Subgroup Membership Problems. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:104-119 [Conf]
- Daniel R. L. Brown, Kristian Gjøsteen
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. [Citation Graph (0, 0)][DBLP] CRYPTO, 2007, pp:466-481 [Conf]
- Kristian Gjøsteen, Lillian Kråkmo
Universally Composable Signcryption. [Citation Graph (0, 0)][DBLP] EuroPKI, 2007, pp:346-353 [Conf]
- Suzana Andova, Cas J. F. Cremers, Kristian Gjøsteen, Sjouke Mauw, Stig Fr. Mjølsnes, Sasa Radomirovic
A framework for compositional verification of security protocols [Citation Graph (0, 0)][DBLP] CoRR, 2006, v:0, n:, pp:- [Journal]
A Latency-Free Election Scheme. [Citation Graph (, )][DBLP]
Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks. [Citation Graph (, )][DBLP]
Round-Optimal Blind Signatures from Waters Signatures. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|