- Information Security
- Security Protocols
- 2016. Using Cryptography to Control Your Data at a Distance. ERCIM News. 106: 17-18.
- 2016. Security analysis of the IEEE 802.15.6 standard. International Journal of Communication Systems. 29: 2471-2489. doi: 10.1002/dac.3120
- 2016. Cryptanalysis of a robust key agreement based on public key authentication. Security and Communication Networks. 9: 19-26. doi: 10.1002/sec.1373
- 2015. Cryptanalysis of two PAKE protocols for body area networks and smart environments. International Journal of Network Security. 17: 629-636.
- 2015. On vulnerabilities of the security association in the IEEE 802.15.6 standard. Lecture Notes in Computer Science. 8976: 245-260. doi: 10.1007/978-3-662-48051-9_18
- 2015. Cryptanalysis of a Protocol from FC'10. Lecture Notes in Computer Science. 8975. doi: 10.1007/978-3-662-47854-7
- 2015. Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy. Security and Communication Networks. 8: 694-701. doi: 10.1002/sec.1018
- 2014. Security analysis of J-PAKE. Proceedings of the IEEE Symposium on Computers and Communications. 6 pages. doi: 10.1109/ISCC.2014.6912576
- 2013. Feature-based type identification of file fragments. Security and Communication Networks. 6: 115-128. doi: 10.1002/sec.553
- 2015. Security protocols and related topics. University of Bergen.
Cryptographic Tools for Cloud Security
"Cryptographic Tools for Cloud Security" is a collaborative project funded by the Norwegian Research Council from 2016 to 2019. It will study new cryptographic tools to enable cloud security against powerful attackers. The research involves experts at Norwegian University of Science and Technology and University of Bergen, in cooperation with University of Mannheim.
The new cryptographic primitives, protocol and models which we will develop will lead to theoretical advances as well as practical outcomes. We are following the current important trend in cryptographic research to connect rigorous results strongly to real-world usage. This is now both possible and timely given that a level of maturity has been reached in cloud computing which will allow us to demonstrate the practical effectiveness of our proposals, to complement their theoretical analysis.
More information: https://www.ntnu.edu/iik/cloudcrypto