• Authentication and Encryption in Janus-Based Wireless Underwater Communications 

      Petrović, Branislav (Master thesis, 2022)
      Trådløs undervannskommunikasjon finner vanligvis sted ved hjelp av akustiske bølger på grunn av deres overlegne robusthet og rekkevidde sammenlignet med radiobølger eller andre kommunikasjonsmedier. Men akustiske bølger ...
    • Bitcoin Unchained 

      Boyd, Colin Alexander; Carr, Christopher; Boyen, Xavier; Haines, Thomas (Journal article, 2017)
      Bitcoin’s distributed ledger is an innovative way of solving the double spending problem in a decentralised system. However, it causes incompressible transaction delays and incentivises consolidation of mining power. We ...
    • A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks 

      Gjøsteen, Kristian; Gritti, Clementine Jeanne Pierrette; Boyd, Colin Alexander; Haines, Thomas Edmund (Peer reviewed; Journal article, 2019)
      A Blind Coupon Mechanism (BCM) allows spreading of alerts quietly and quickly over unreliable networks. The BCM primitive ensures that alerts are efficiently broadcast while the nature of these signals are securely hidden. ...
    • Cloud Security without Trust 

      Gilberg, Ole Rasmus (Master thesis, 2014)
      The usage of cloud services is increasing for each day. This applies to private persons which store pictures and documents, as well as bigger corporations whom outsource parts of, or all, handling of their ICT infrastructure ...
    • Comparative Analysis of Bitcoin and Ethereum 

      Rudlang, Marit (Master thesis, 2017)
      Since Bitcoin was launched in 2009, several new cryptocurrencies have been initiated with variations to Bitcoin's original design. Although Bitcoin still remains the most prominent actor in the market, some technical ...
    • Computationally Analyzing the ISO 9798-2.4 Authentication Protocol 

      Hale, Britta J.; Boyd, Colin Alexander (Chapter, 2014)
      We provide a computational analysis of the ISO 9798–2.4 mutual authentication standard protocol in the model of Bellare and Rogaway. In contrast to typical analyses of standardized protocols, we include the optional data ...
    • Content-independent embedding scheme for multi-modal medical image watermarking 

      Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander (Journal article; Peer reviewed, 2015)
      Background As the increasing adoption of information technology continues to offer better distant medical services, the distribution of, and remote access to digital medical images over public networks continues to grow ...
    • Cryptographic access control for big data platforms 

      Viken, Christoffer (Master thesis, 2017)
      This thesis has looked into the performance of select cryptographic algorithms and compared them to each other in the context of big data. The algorithms compared are Advanced Encryption Standard (AES), RSA, and a ...
    • Cryptography for Innovative Blockchain Services 

      Raikwar, Mayank (Doctoral theses at NTNU;2022:241, Doctoral thesis, 2022)
      Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has been thriving. Much work has been carried out for blockchain use cases in different industrial areas such as healthcare, ...
    • Definitions for Plaintext-Existence Hiding in Cloud Storage 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Raddum, Håvard; Toorani, Mohsen (ARES 2018;Article No. 41, Chapter, 2018)
      Cloud storage services use deduplication for saving bandwidth and storage. An adversary can exploit side-channel information in several attack scenarios when deduplication takes place at the client side, leaking information ...
    • Digital image watermarking: its formal model, fundamental properties and possible attacks 

      Nyeem, Hussain; Boles, Wageeh; Boyd, Colin Alexander (Journal article; Peer reviewed, 2014)
      While formal definitions and security proofs are well established in some fields like cryptography and steganography, they are not as evident in digital watermarking research. A systematic development of watermarking schemes ...
    • Engineering device pairing with fuzzy cryptography 

      Matetic, Sinisa (Master thesis, 2014)
      Device pairing protocols are a subset of secure communication protocols used to bootstrap a secure channel over an insecure communication link between two or more devices. Example protocols use technologies such as Bluetooth ...
    • Exploring Libraries for Homomorphic Encryption 

      Lokanath, Ashmitha (Master thesis, 2018)
      Fully homomorphic encryption (FHE) is a very modern encryption technique which allows any number of efficient computations to be carried out on the encrypted data without having access to the secret key. FHE schemes can ...
    • Fast and Secure Updatable Encryption 

      Boyd, Colin Alexander; Davies, Gareth Thomas; Gjøsteen, Kristian; Jiang, Yao (Peer reviewed; Journal article, 2020)
      Updatable encryption allows a client to outsource ciphertexts to some untrusted server and periodically rotate the encryption key. The server can update ciphertexts from an old key to a new key with the help of an update ...
    • From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange 

      de Kock, Bastiaan Borgert (Doctoral theses at NTNU;2023:201, Doctoral thesis, 2023)
      Key exchange is a cryptographic mechanism: it enables two or more parties to agree upon a shared key that is known only to them, even in the presence of an adversary that has access to all communication between the parties. ...
    • From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS 

      Boyd, Colin Alexander; Hale, Britta; Mjølsnes, Stig Frode; Stebila, Douglas (Chapter, 2016)
      Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and the constructions used in practice all ...
    • Human Computable Passwords - Design and Analysis. 

      Kofoed, Anders (Master thesis, 2015)
      Password management is a major issue in the Internet centric world. This project presents the human computable password management scheme by Blocki et al., which makes it possible for human users to calculate passwords ...
    • Hybrid Group Key Exchange with Application to Constrained Networks 

      Boyd, Colin Alexander; Fondevik, Elsie Margrethe Staff Mestl; Gjøsteen, Kristian; Millerjord, Lise (Peer reviewed; Journal article, 2023)
      We expand the security model for group key exchange of Poettering et al. (CT-RSA 2021) to allow for more fine-tuned reveal of both state and keying material. The expanded model is used to analyse the security of hybrid ...
    • Identification of malicious behavior patterns for software 

      Khan, Saad Usman (Master thesis, 2014)
      Over the years malware has increased in number and became increasingly harmful. Traditionally, anti-virus suites are used to protect the computers from various forms of malware. In recent years a new technique called ...
    • Information Security Incident Management: A case study about preparedness and readiness 

      Akhtar, Sania (Master thesis, 2014)
      Organisasjoner idag øker sin konkurranseevne ved stadig å benytte seg av nyere teknologi, og avhengigheten rettet til informasjonsteknologi ser bare ut til å bre seg. I dagens samfunn lagres mesteparten av informasjonen ...