Malicious cryptography
Doctoral thesis
Permanent lenke
https://hdl.handle.net/11250/2649323Utgivelsesdato
2020Metadata
Vis full innførselSamlinger
Består av
Paper 1. Galteland, Herman; Gjøsteen, Kristian. Malware encryption schemes – rerandomizable ciphertexts encrypted using environmental key. Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology. This is a post-peer-review, pre-copyedit version of a chapter published in Mycrypt 2016 Conference proceedings.Paper 2: Galteland, Herman; Gjøsteen, Kristian. Subliminal channels in post-quantum digital signature schemes. Published at Eprint, https://eprint.iacr.org/2019/574.pdf
Paper 3: Davies, Gareth T.; Galteland, Herman; Gjøsteen, Kristian; Jiang, Yao. Cloud-assisted Asynchronous Key Transport with Post-Quantum Security. Published at Eprint, https://eprint.iacr.org/2019/1409
Paper 4: Galteland, Herman; Mjølsnes, Stig Frode; Olimid, Ruxandra-Florentina. Attacks on the Basic cMix Design: On the Necessity of Commitments and Randomized Partial Checking. Lecture Notes in Computer Science (LNCS) 2017 ;Volum 10311. s. 463-473. This is a post-peer-review, pre-copyedit version of an article published in Lecture Notes in Computer Science. The final authenticated version is available online at: https://doi.org/10.1007/978-3-319-61273-7_22
Paper 5: Galteland, Herman; Gjøsteen, Kristian. Jurisdictional adversaries monitoring and reconstructing the Tor network. Published at ArXiv, https://arxiv.org/abs/1808.09237
Paper 6: Galteland, Herman; Silde, Tjerand. Verifiable Random Secrets and Subliminal-Free Digital Signatures.