• Key recovery: Inert and public 

      Boyd, Colin Alexander; Boyen, Xavier; Carr, Christopher; Haines, Thomas (Journal article; Peer reviewed, 2017)
      We propose a public key infrastructure framework, inspired by modern distributed cryptocurrencies, that allows for tunable key escrow, where the availability of key escrow is only provided under strict conditions and ...
    • Long-term Bitcoin Scalability 

      Thorsrud, Erlend Solberg (Master thesis, 2018)
      The interest has grown around Bitcoin as a trustless and decentralized digital payment service. Along with the increase in users and transactions, Bitcoin suffers from challenges regarding scalability. Many solutions have ...
    • A Modern View on Forward Security 

      Boyd, Colin Alexander; Gellert, Kai (Peer reviewed; Journal article, 2020)
      Forward security ensures that compromise of entities today does not impact the security of cryptographic primitives employed in the past. Such a form of security is regarded as increasingly important in the modern world ...
    • Oblivious RAM in practice 

      Thoresen, Olav Sortland (Master thesis, 2019)
      Målet med denne masteroppgaven er å studere ytelsen til nåværende Oblivious RAM (ORAM) løsninger og undersøke hvor praktiske de er i et skylagrings-scenario. For å gjøre dette ble tre ORAM løsninger (ObliviStore, CURIOUS ...
    • Offline Assisted Group Key Exchange 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Journal article; Peer reviewed, 2018)
      We design a group key exchange protocol with forward secrecy where most of the participants remain offline until they wish to compute the key. This is well suited to a cloud storage environment where users are often offline, ...
    • On Graph Based Cryptocurrency Systems 

      Helland, Erlend Lid (Master thesis, 2019)
      Denne oppgaven undersøker og sammenligner trekk ved kryptovaluta basert på blokkjeder med kryptovaluta basert på Rettede Asykliske Grafer (RAG). Blokkjedebasert kryptovaluta møter utfordringer på felt som skalering, ...
    • Outsourced incident management services 

      Reyes Zuniga, Alfredo Ramiro (Master thesis, 2015)
      With increasing use of information and communication technologies (ICT), many organizations are outsourcing information security services to managed security service providers (MSSP). This project reports results on current ...
    • OWASP Top 10 - Do Startups Care? 

      Søhoel, Halldis M; Jaatun, Martin Gilje; Boyd, Colin Alexander (Chapter, 2018)
      In a cut-throat world where time-to-market can be the difference between success and failure, it can be tempting for startups to think “let’s get it to work first, and then we’ll worry about security later.” However, major ...
    • OWASP top ten - What is the state of practice among start-ups? 

      Søhoel, Halldis Margrete (Master thesis, 2018)
      New apps and web services are increasingly serving our everyday needs, and they are appearing at high speed. How secure are all these services? This thesis has tested the security of five web services developed by startups. ...
    • Post-Quantum Key Exchange in Telegram's MTProto Protocol 

      Rognerud, Robert (Master thesis, 2021)
      Eksperter i feltet post-kvantekryptografi antar at kvantedatamaskiner vil knekke asymmetrisk kryptografi innen 30 år. Kvantedatamaskiner kan bruke allerede eksisterende algoritmer, som Shors algoritme, til å løse de ...
    • Power Analytic Attacks on CRYSTALS-Kyber 

      Håkegård, Erlend (Master thesis, 2023)
      Denne avhandlingen undersøker effekten av effektanalytiske sidekanalangrep på den kvantesikre nøkkelkapslingsalgoritmen CRYSTALS-Kyber. Vi gjenskapte og forbedret et tidligere korrelasjonsangrep utført av Karlov et al. Vi ...
    • Preserving Steganography Information Over Image Transformations 

      in't Veld, Kristian (Master thesis, 2022)
      Steganografi er kunsten å skjule informasjon i andre medium. Innen bildesteganografi blir skjulte meldinger gjemt i bilder som ser normale ut for det blotte øye, men som en mottaker kan hente ut den skjulte meldingen fra. ...
    • Prioritisation of security in agile software development projects 

      Tøndel, Inger Anne (Doctoral theses at NTNU;2022:285, Doctoral thesis, 2022)
      Agile software development is driven by business value, and strives towards visible progressthrough features. Consequently, the somewhat invisible and overarching aspect of softwaresecurity is at the risk of being neglected.A ...
    • Proof-of-Stake for Consensus in Cryptocurrencies 

      Buøen, Marie Gotaas (Master thesis, 2018)
      Blockchain technology and cryptocurrencies, with Bitcoin and Etherum leading the field, has gained a much attention in recent years. Not only because of their highly volatile prices, which makes them a perfect trading ...
    • Relay attacks of NFC smart cards 

      Chu, Xiqing (Master thesis, 2014)
      Near Field Communication (NFC) is a set of standards, which allows two devices to transfer messages over a short range of distance of 10 cm. NFC based smart cards and applications are widely used for public transportation, ...
    • Risk Compensation in Information Security 

      Mæhlum, Hanne Riise (Master thesis, 2014)
      This thesis looks into the concept of risk compensation in information security. An understanding of risk compensation theory is provided along with an analysis of what elements to consider when looking at risk compensation ...
    • SafeLib: a practical library for outsourcing stateful network functions securely 

      Marku, Enio; Biczok, Gergely; Boyd, Colin Alexander (Chapter, 2021)
      A recent trend is to outsource virtual network functions (VNFs) to a third-party service provider, such as a public cloud. Since the cloud is usually not trusted, redirecting enterprise traffic to such an entity introduces ...
    • Secure channels and termination: The last word on TLS 

      Boyd, Colin Alexander; Hale, Britta (Peer reviewed; Journal article, 2019)
      Secure channels are one of the most pivotal building blocks of cryptography today. Internet connections, secure messaging, protected IoT data, etc., all rely upon the security of the underlying channel. In this work we ...
    • Secure data sharing in the cloud 

      Gran, Eivind Nordal (Master thesis, 2019)
      Sikkerhet innen skydeling er et viktig tema i verden i dag. Sikker- hetssystemet i de vanligste løsningene for skydeling krever at brukeren stoler på leverandøren av skytjenesten for å beskytte den opplastede dataen. En ...
    • Secure Termination in Real-World Security Protocols 

      Toreskås, Jonas Lunde (Master thesis, 2016)
      As the Internet was initially invented without any security concerns, a way of secure communication over an untrusted network was nowhere to be found. After years of research, the TLS protocol became this Internet standard ...