Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Norwegian Internet Voting Protocol.. IACR Cryptology ePrint Archive, (2013)The Norwegian Internet Voting Protocol: A new Instantiation., and . IACR Cryptology ePrint Archive, (2015)An experiment on the security of the Norwegian electronic voting protocol., and . Ann. des Télécommunications, 71 (7-8): 299-307 (2016)Spreading Alerts Quietly and the Subgroup Escape Problem., , , , and . J. Cryptol., 28 (4): 796-819 (2015)A Novel Framework for Protocol Analysis., , and . J. Internet Serv. Inf. Secur., 1 (2/3): 89-106 (2011)A framework for compositional verification of security protocols., , , , , and . Inf. Comput., 206 (2-4): 425-459 (2008)Lattice-Based Proof of Shuffle and Applications to Electronic Voting., , , , and . CT-RSA, volume 12704 of Lecture Notes in Computer Science, page 227-251. Springer, (2021)Revisiting Practical and Usable Coercion-Resistant Remote E-Voting., , , , , and . E-VOTE-ID, volume 12455 of Lecture Notes in Computer Science, page 50-66. Springer, (2020)Offline Assisted Group Key Exchange., , , and . ISC, volume 11060 of Lecture Notes in Computer Science, page 268-285. Springer, (2018)Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)