Zobrazeno 1 - 9
of 9
pro vyhledávání: '"Gjosteen, Kristian"'
Autor:
Gjøsteen, Kristian
Public key encryption was first proposed by Diffie and Hellman [16], and widely popularised with the RSA cryptosystem [37]. Over the years, the security goals of public key encryption have been studied [17, 22], as have adversary models [30, 36], and
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-128
Autor:
McMurtry, Eleanor, Boyen, Xavier, Culnane, Chris, Gjøsteen, Kristian, Haines, Thomas, Teague, Vanessa
We propose a protocol for verifiable remote voting with paper assurance. It is intended to augment existing postal voting procedures, allowing a ballot to be electronically constructed, printed on paper, then returned in the post. It allows each vote
Externí odkaz:
http://arxiv.org/abs/2111.04210
We present an approach for performing the tallying work in the coercion-resistant JCJ voting protocol, introduced by Juels, Catalano, and Jakobsson, in linear time using fully homomorphic encryption (FHE). The suggested enhancement also paves the pat
Externí odkaz:
http://arxiv.org/abs/1901.02560
Autor:
Galteland, Herman, Gjøsteen, Kristian
We model and analyze passive adversaries that monitors Tor traffic crossing the border of a jurisdiction an adversary is controlling. We show that a single adversary is able to connect incoming and outgoing traffic of their border, tracking the traff
Externí odkaz:
http://arxiv.org/abs/1808.09237
Orthogonal and quasi-orthogonal matrices have a long history of use in digital image processing, digital and wireless communications, cryptography and many other areas of computer science and coding theory. The practical benefits of using orthogonal
Externí odkaz:
http://arxiv.org/abs/1801.06736
Autor:
Andova, Suzana, Cremers, Cas, Gjosteen, Kristian, Mauw, Sjouke, Mjolsnes, Stig F., Radomirovic, Sasa
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a frame
Externí odkaz:
http://arxiv.org/abs/cs/0611062
Autor:
Andova, Suzana, Cremers, Cas, Gjøsteen, Kristian, Mauw, Sjouke, Mjølsnes, Stig F., Radomirović, Saša
Publikováno v:
In Information and Computation 2008 206(2):425-459
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.