• Authenticated Key Exchange: An analysis of low-cost protocols 

      Hagen, Haakon Kristian (Master thesis, 2023)
      I Internet of Things feltet er det et fokus på kosteffektive protokoller. Når det gjelder nøkkelutvekslingsprotokoller så er det et behov for å balansere sikkerhet, kompleksistet og kostnad. Forskjellige protokoller kan ...
    • Automatic Security Analysis of Lightweight Authentication and Key Exchange Protocols 

      Kabra, Adhirath (Master thesis, 2022)
      Perfect Forward Secrecy (PFS) is vital in contemporary authenticated key exchange (AKE) protocols. Typically attained using public key cryptography, achieving forward secrecy is infeasible for communication in resource ...
    • Hybrid Group Key Exchange with Application to Constrained Networks 

      Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise (Peer reviewed; Journal article, 2023)
      We expand the security model for group key exchange of Poettering et al. (CT-RSA 2021) to allow for more fine-tuned reveal of both state and keying material. The expanded model is used to analyse the security of hybrid ...
    • Modular Design of KEM-Based Authenticated Key Exchange 

      Boyd, Colin Alexander; Millerjord, Lise; de Kock, Bor (Peer reviewed; Journal article, 2023)
    • Picnic with Friends: Constructing post quantum digital signature schemes 

      Millerjord, Lise (Master thesis, 2021)
      Det digitale signatursystemet, Picnic [5], er et post-kvantesystem som ble introdusert som en del av NIST-prosessen for å standardisere post-kvantekryptografi [15]. Vi ser på hvordan Picnic er konstruert, og sikkerhetsegenskapene ...
    • Symmetric Key Exchange with Full Forward Security and Robust Synchronization 

      Boyd, Colin Alexander; Davies, Gareth T.; de Kock, Bor; Gellert, Kai; Jager, Tibor; Millerjord, Lise (Peer reviewed; Journal article, 2021)
      We construct lightweight authenticated key exchange protocols based on pre-shared keys, which achieve full forward security and rely only on simple and efficient symmetric-key primitives. All of our protocols have rigorous ...