• Cross-sensor periocular biometrics in a global pandemic: Comparative benchmark and novel multialgorithmic approach 

      Alonso-Fernandez, Fernando; Raja, Kiran; Ramachandra, Raghavendra; Busch, Christoph; Bigun, Josef; Vera-Rodriguez, Ruben; Fierrez, Julian (Peer reviewed; Journal article, 2022)
      The massive availability of cameras and personal devices results in a wide variability between imaging conditions, producing large intra-class variations and a significant performance drop if images from heterogeneous ...
    • Cruising the marginal ice zone: climate change and Arctic tourism 

      Palma, David; Varnajot, Alix; Dalen, Kari; K. Basaran, Ilker; Brunette, Charles; Bystrowska, Marta; D. Korablina, Anastasia; Nowicki, Robynne C.; Ronge, Thomas A. (Journal article; Peer reviewed, 2019)
      The effects of climate change are leading to pronounced physical and ecological changes in the Arctic Marginal Ice Zone (MIZ). These are not only of concern for the research community but also for the tourism industry ...
    • Cryptanalysis of a cascade of non-uniformly clocked linear feedback shift registers 

      Shi, Lelai (Master thesis, 2010)
      In this thesis, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generators employing linear feedback shift registers (LFSRs) with so-called irregular clocking. The cascade of LFSRs is a well ...
    • Cryptanalysis of a Pseudorandom Generator for Cross-Border E-Commerce 

      Shi, Lelai; Liu, Suhui; Petrovic, Slobodan (Journal article; Peer reviewed, 2019)
      In this paper, we study ciphertext-only cryptanalysis of a cascade of pseudorandom sequence generators employing linear feedback shift registers (LFSRs) with so-called irregular clocking. The cascade of LFSRs is a well-known ...
    • Cryptanalysis of IEEE 802.11i TKIP 

      Halvorsen, Finn Michael; Haugen, Olav (Master thesis, 2009)
      The Temporal Key Integrity Protocol (TKIP) was created to fix the weaknesses of Wired Equivalent Privacy (WEP). Up until November 2008, TKIP was believed to be a secure alternative to WEP, although some weak points were ...
    • Cryptanalysis of IEEE 802.11i TKIP. 

      Lodhi, Ammar (Master thesis, 2010)
      This thesis is based upon the work of Beck and Tews [ 24 ]. It presents and experimentally Validate the Beck and Tews attack on a network with QoS client Associated with a Non- QoS AP.This is done by Slightly extending the ...
    • Cryptanalysis of Irregularly Clocked LFSR: using approximate RBP search on FPGA 

      Øverbø, Magnus (Master thesis, 2019)
      Kryptoanalyse av et kryptosystem som benytter en Binary Rate Multiplier (BRM), 0/1 klokking, som nøkkelgenerator resulterer i at Siegenthaler's klassiske korrelasjonsangrep[4] ikke kan benyttes. Dette pga. at kryptoteksten ...
    • Cryptographic access control for big data platforms 

      Viken, Christoffer (Master thesis, 2017)
      This thesis has looked into the performance of select cryptographic algorithms and compared them to each other in the context of big data. The algorithms compared are Advanced Encryption Standard (AES), RSA, and a ...
    • Cryptographic Schemes Based on Isogenies 

      Stolbunov, Anton (Doktoravhandlinger ved NTNU, 1503-8181; 2012:16, Doctoral thesis, 2012)
    • Cryptographic smooth neighbors 

      Bruno, Giacomo; Corte-Real Santos, Maria; Costello, Craig; Eriksen, Jonathan Komada; Meyer, Michael; Naehrig, Michael; Sterner, Bruno (Peer reviewed; Journal article, 2023)
      We revisit the problem of finding two consecutive B-smooth integers by giving an optimised implementation of the Conrey-Holmstrom-McLaughlin “smooth neighbors” algorithm. While this algorithm is not guaranteed to return ...
    • Cryptography for Innovative Blockchain Services 

      Raikwar, Mayank (Doctoral theses at NTNU;2022:241, Doctoral thesis, 2022)
      Since the advent of Bitcoin, scientific interest in its underlying core technology Blockchain has been thriving. Much work has been carried out for blockchain use cases in different industrial areas such as healthcare, ...
    • Cryptography for the People: Protecting marginalised groups from mass surveillance 

      Tveit, Anna Storli (Master thesis, 2023)
      I 2013 avslørte Edward Snowden, en varsler fra Nasjonal Sikkerhetsmyndighet (NSM) i USA, dokumenter som avslører hvordan amerikansk etteretningstjeneste brukte masseovervåking for å overvåke sine egne borgere og folk som ...
    • CS Measures for Nuclear Power Plant Protection: A Systematic Literature Review 

      Chowdhury, Nabin (Peer reviewed; Journal article, 2021)
      As digital instrumentation in Nuclear Power Plants (NPPs) is becoming increasingly complex, both attack vectors and defensive strategies are evolving based on new technologies and vulnerabilities. Continued efforts have ...
    • CybAllaince WP3 Course Material Preparation Report 2023 

      Amro, Lama Mohammad Saed; Gkioulos, Vasileios (Research report, 2023)
    • CybAllaince WP3 Report Joint Supervision, and Guest Tutorials Report 2023 

      Amro, Lama Mohammad Saed; Gkioulos, Vasileios (Research report, 2023)
    • Cyber Crisis Chess Board for Strategic and Tactical Level of Organizations 

      Lundli, Sivert (Master thesis, 2023)
      En rekke alvorlige dataangrep i de senere år har gang på gang vist hvor avhengig vi som samfunn er av digitale løsninger, og hvor sårbare vi som samfunn er, skulle disse bli satt ut av spill. Ved bortfall av digitale ...
    • Cyber Grooming Detection: Human or Machine? Or Hybrid? 

      Antonsen, Joakim Granli (Master thesis, 2021)
      Den teknologiske utviklingen byr på mange nye muligheter. Med slike muligheter kommer også nye utfordringer. En av disse er cybergrooming. Predatorer utnytter disse nye mulighetene som lar dem være til stede over alt i det ...
    • Cyber Physical Defense Framework for Distributed Smart Grid Applications 

      Sinha, Ayush; Mohandas, Manasi; Pandey, Pankaj; Vyas, O.P. (Journal article; Peer reviewed, 2021)
    • Cyber Ranges and Security Testbeds: Scenarios, Functions, Tools and Architecture 

      Yamin, Muhammad Mudassar; Katt, Basel; Gkioulos, Vasileios (Journal article; Peer reviewed, 2019)
      The first line of defense against cyber threats and cyber crimes is to be aware and get ready, e.g., through cyber security training. Training can have two forms, the first is directed towards security professionals and ...
    • Cyber Risk Assessment For Ships (CRASH) 

      Oruc, Aybars; Kavallieratos, Georgios; Gkioulos, Vasileios; Katsikas, Sokratis (Peer reviewed; Journal article, 2023)