2017

Proceedings

  • C. Otterstad and T. Yarygina, “Low-level exploitation mitigation by diverse microservices,” European Conference on Service-Oriented and Cloud Computing (ESOCC), Oslo, Norway, September 27–29, 2017
  • A. Severinson, A. Graell i Amat, and E. Rosnes, “Block-diagonal coding for distributed computing with straggling servers,” in Proc. IEEE Inf. Theory Workshop, Kaohsiung, Taiwan, November 6–10, 2017
  • B. Greve, H. Raddum, and Ø. Ytrehus, “Re-linearization and elimination of variables in boolean equation systems,” Workshop on Mathematical Methods for Cryptography (MMC), Lofoten, Svolvær, Norway, September 4–8, 2017
  • B. Greve, H. Raddum, G. Fløystad, and Ø. Ytrehus, “Eliminating variables in boolean equation systems,” 2nd International Workshop on Boolean Functions and their Applications (BFA), July 3–8, 2017
  • H. Raddum and S. Varadharajan, “Representing integer multiplication using binary decision diagrams,” workshop on Mathematical Methods for Cryptography, Lofoten, Svolvær, Norway, September 4–8, 2017
  • T. Yarygina, “Restful is not secure,” International Conference on Applications and Technologies in Information Security (ATIS 2017), Auckland, New Zealand, July 6–7, 2017
  • C.W. Otterstad, “On the effectiveness of non-readable executable memory against BROP,” International Conference on Applications and Technologies in Information Security (ATIS 2017), Auckland, New Zealand, July 6–7, 2017
  • D.G.M. Mitchell and E. Rosnes, “Edge spreading design of high rate array-based SC-LDPC codes,” in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017
  • S. Kumar, E. Rosnes, A. Graell i Amat, “Private information retrieval in distributed storage systems using an arbitrary linear code,” in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017
  • F. Armknecht, C. Boyd, G.T. Davies, K. Gjøsteen, and M. Toorani, “Side channels in deduplication: trade-offs between leakage and efficiency”, presented at the ACM Asia Conference on Computer and Communications Security (ASIACCS’17), Abu Dhabi, UAE, April 2-6, 2017

Invited talk

  • Ø. Ytrehus,”Optimum MDS convolutional codes over GF(2^m) and their relation to the trace function,” invited talk at the workshop on Mathematical Methods for Cryptography (MMC), Svolvær, Norway, September 2017 (joint work with Á. Barbero) 

2016

Journal articles

  • S. Kumar, E. Rosnes, and A. Graell i Amat, “Secure repairable fountain codes,” IEEE Communications Letters, vol. 20, no. 8, 2016, 1491–1494
  • M. Toorani, “Security analysis of the IEEE 802.15.6 standard,” International Journal of Communication Systems, vol. 29, no. 17, 2016, 2471–2489
  • O. Lysne, K.J. Hole, C.W. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation,” IEEE Computer, vol. 49, no. 8, 2016, 62–69
  • M. Toorani, “Cryptanalysis of a robust key agreement based on public key authentication,” Journal of Security and Communication Networks, vol.9, no.1, 2016, 19-26
  • K.J. Hole, “Building trust in e-government services,” IEEE Computer, vol. 49, no. 1, 2016, 66–74

Book

  • K.J. Hole, Anti-fragile ICT Systems, Springer, 2016

Proceedings

  • C.W. Otterstad, “On trends in low-level exploitation,” NISK 2016, Bergen, Norway, November 29–30, 2016
  • Y. Yakimenka and E. Rosnes, “On failing sets of the interval-passing algorithm for compressed sensing,” in Proc. 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 27-30, 2016
  • S. Rasoolzadeh and H. Raddum, “Faster key recovery attack on round-reduced PRINCE,”  LightSec 2016, Lecture Notes in Computer Science 10098, pp.3-17, 2016
  • S. Rasoolzadeh, “An improved truncated differential cryptanalysis of KLEIN,” Central European Conference on Cryptography, Piestany, Slovakia, June 22-24, 2016
  • S. Rasoolzadeh and H. Raddum, “Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN,” Tatra Mountains Mathematical Publication, Volume 67, pp. 149-167
  • E. Rosnes and M. Helmling, “On adaptive linear programming decoding of nonbinary linear codes over prime fields,” in Proc. 9th Int. Symp. Turbo Codes & Iterative Inf. Processing, Brest, France, Sep. 2016
  • I.E. Bocharova, B.D. Kudryashov, E. Rosnes, V. Skachek, and Ø. Ytrehus, “Wrap-around sliding-window near-ML decoding of binary LDPC codes over the BEC,” 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), Brest, France, September 5-9, 2016
  • D.N.K. Jayakody and E. Rosnes, “Spatially-coupled LDPC coding in threshold-based lossy forwarding scheme,” in Proc. IEEE 84th Veh. Tech. Conf. (VTC), Montréal, Canada, Sep. 2016
  • E. Rosnes and M. Helmling, “Constructing valid convex hull inequalities for single parity-check codes over prime fields,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Barcelona, Spain, July 10–15, 2016
  • S. Rasoolzadeh and H. Raddum, “Cryptanalysis of 6-round PRINCE using 2 known plaintexts,” presented at ArcticCrypt 2016, Longyearbyen, Svalbard, Norway, July 17-22, 2016
  • S. Rasoolzadeh and H. Raddum, “Cryptanalysis of PRINCE with minimal data,” AfricaCrypt 2016, Lecture Notes in Computer Science vol. 9646, Springer Verlag, 2016, 109-126
  • E. Rosnes and M. Helmling, “On adaptive linear programming decoding of linear codes over GF(8),” in Proc. Inf. Theory Appl. (ITA), La Jolla, CA, USA, Jan.-Feb. 2016

2015

Journal articles

  • M. Toorani, “Cryptanalysis of two PAKE protocols for body area networks and smart environments,” International Journal of Network Security, vol.17, no.5, 2015, 629-636
  • K.J. Hole, “Toward anti-fragility: a malware-halting technique,” IEEE Security & Privacy, vol. 13, no. 4, 2015, 40-46
  • K.J. Hole, “Diversity Reduces the Impact of Malware,” IEEE Security & Privacy, vol. 13, no. 3,2015, 48-54
  • O. Kazymyrov, R. Oliynykov, H. Raddum, “Influence of addition modulo 2n on algebraic attacks”, Cryptography and Communications, vol. 8, no. 2, 277 – 289
  • M. Toorani, “Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy,” Journal of Security and Communication Networks, vol.8, no.4, 2015, 694-701

Proceedings

  • Á. Barbero and Ø. Ytrehus, “A coding-based approach to robust shortest-path routing,” 4th Int. Castle Meeting on Coding Theory and its Applications, 2015
  • Á. Barbero and Ø. Ytrehus, “Network coding for cyclic networks,” Mathematical Coding Theory in Multimedia Streaming, Banff, Canada, 2015
  • E. Rosnes and M. Helmling, “On adaptive linear programming decoding of ternary linear codes,” IEEE Information Theory Workshop, 2015
  • E. Rosnes, “On the minimum distance of array-based spatially coupled low-density parity-check codes,” IEEE International Symposium on Information Theory, 2015
  • E. Rosnes and A. Graell i Amat, “Analysis of spatially-coupled counter braids,” in Proc. IEEE Inf. Theory Workshop (ITW), Jeju, Korea, Oct. 2015, 133–137
  • H. Raddum and O. Kazymyrov, “Algebraic attacks using binary decision diagrams,” BalkanCryptSec 2014, Lecture Notes in Computer Science, vol. 9024, Springer, 2015
  • H. Raddum, “Algebraic Analysis of the Simon Block Cipher Family,” LatinCrypt 2015, Lecture Notes in Computer Science, vol. 9230, 157-169, Springer, 2015
  • S. Kumar, A. Graell i Amat, I. Andriyanova, and F. Brännström, “A family of erasure correcting codes with low repair bandwidth and low repair complexity,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), San Diego, CA, USA, Dec. 2015
  • C.W. Otterstad, “A brief evaluation of Intel®MPX,” in Proc. 9th Annual IEEE InternationalSystems Conference (SysCon), Vancouver, BC, April, 2015
  • M. Toorani, “On continuous after-the-fact leakage-resilient key exchange,” in Proc. 2nd Workshop on Cryptography and Security in Computing Systems (CS2’15), Amsterdam, Netherlands, Jan. 2015
  • M. Toorani, “On vulnerabilities of the security association in the IEEE 802.15.6 standard,” Financial Cryptography and Data Security, LNCS 8976, Springer, 2015, 245–260
  • M. Toorani, “Cryptanalysis of a protocol from FC’10 (Poster Abstract),” Financial Cryptography and Data Security, LNCS 8975, Springer, 2015

Invited talks

  • M. Helmling, E. Rosnes, and S. Ruzika, “On maximum-likelihood decoding of polar codes,” invited talk at IEEE Inf. Theory Workshop (ITW), Jerusalem, Israel, April-May 2015.
  • E. Rosnes and A. Graell i Amat, “On the analysis of spatially-coupled counter braids,” invited talk at Inf. Theory Appl. (ITA), La Jolla, CA, USA, Feb. 2015.