• A Modular Security Analysis of EAP and IEEE 802.11 

      Jacobsen, Håkon (Doctoral theses at NTNU;2017:290, Doctoral thesis, 2017)
      This thesis presents a computational reduction-based security analysis of the Extensible Authentication Protocol (EAP) and the IEEE 802.11 protocol. EAP is a widely used authentication framework while IEEE 802.11 is the ...
    • Classification of Keys in MQQ-SIG 

      Jacobsen, Håkon (Master thesis, 2012)
      The security of almost all public-key cryptography is based on some computationally hard problem. Most prominent are the problems of factoring integers into primes and computing discrete logarithms in finite groups. However, ...
    • Highly Efficient Key Exchange Protocols with Optimal Tightness 

      Cohn-Gordon, Katriel; Cremers, Cas; Gjøsteen, Kristian; Jacobsen, Håkon; Jager, Tibor (Journal article; Peer reviewed, 2019)
      In this paper we give nearly tight reductions for modern implicitly authenticated Diffie-Hellman protocols in the style of the Signal and Noise protocols, which are extremely simple and efficient. Unlike previous approaches, ...
    • Pi-Cipher: Authenticated Encryption for Big Data 

      Gligoroski, Danilo; Mihajloska, Hristina; Samardjiska, Simona; Jacobsen, Håkon; Jensen, Rune Erlend; El-Hadedy, Mohamed (Chapter, 2014)
      In today’s world of big data and rapidly increasing telecommunications, using secure cryptographic primitives that are parallelizable and incremental is becoming ever more important design goal. π-Cipher is parallel, ...