2018

Journal articles

  • K.J. Hole and C. Otterstad, ” Software systems with antifragility to downtime,” accepted for publication in IEEE Computer
  • C.-Y Wei, H.-Y. Lin, P.-N. Chen, Y.S. Han, and P.K. Varshney, “Target localization using sensor location knowledge in wireless sensor networks,” to appear in IEEE Wireless Communications Letters
  • E. Rosnes and A. Graell i Amat, “Asymptotic analysis and spatial coupling of counter braids,” to appear in IEEE Transactions on Information Theory
  • Á. Barbero and Ø. Ytrehus, “Rate (n-1)/n systematic memory maximum distance separable convolutional codes,” to appear in IEEE Transactions on Information Theory, special issue in memory of Solomon W. Golomb, 2018

Proceedings

  • H.-Y. Lin, S. Kumar, E. Rosnes, and A. Graell i Amat, “A capacity-achieving PIR protocol for distributed storage using an arbitrary linear code,” in Proc. IEEE International Symposium on Information Theory (ISIT 2018), Vail, CO, June 17–22, 2018
  • H.-Y. Lin, S.M. Moser, and P.-N. Chen, “The r-wise Hamming distance and its operational interpretation for block codes,” in Proc. 52th Annual Conference on Information Sciences and Systems (CISS’18), Princeton University, Princeton, NJ, USA, Mar. 21–23, 2018
  • D. Yuan, H.-Y. Lin, J. Widmer, and M. Hollick, “Optimal joint routing and scheduling in millimeter-wave cellular networks,” in Proc. 2018 IEEE International Conference on Computer Communications (INFOCOM’18), April 15–19, 2018
  • H.-Y. Lin and E. Rosnes, “Lengthening and extending binary private information retrieval codes,” in Proc. International Zurich Seminar on Information and Communication, Zurich, Switzerland, Feb. 21–23, 2018

Invited talk

  • Ø. Ytrehus,”Coding techniques for communication with low power devices over inductively coupled channels,” invited talk at the Workshop on Coding and Cryptography, Munich, April 10–11, 2018.

2017

Proceedings

  • C. Otterstad and T. Yarygina, “Low-level exploitation mitigation by diverse microservices,” European Conference on Service-Oriented and Cloud Computing (ESOCC), Oslo, Norway, Sept- 27–29, 2017
  • A. Severinson, A. Graell i Amat, and E. Rosnes, “Block-diagonal coding for distributed computing with straggling servers,” in Proc. IEEE Inf. Theory Workshop, Kaohsiung, Taiwan, Nov. 6–10, 2017
  • B. Greve, H. Raddum, and Ø. Ytrehus, “Re-linearization and elimination of variables in boolean equation systems,” Workshop on Mathematical Methods for Cryptography (MMC), Lofoten, Svolvær, Norway, Sept. 4–8, 2017
  • B. Greve, H. Raddum, G. Fløystad, and Ø. Ytrehus, “Eliminating variables in boolean equation systems,” 2nd International Workshop on Boolean Functions and their Applications (BFA), July 3–8, 2017
  • H. Raddum and S. Varadharajan, “Representing integer multiplication using binary decision diagrams,” Workshop on Mathematical Methods for Cryptography (MMC), Lofoten, Svolvær, Norway, Sept. 4–8, 2017
  • T. Yarygina, “Restful is not secure,” International Conference on Applications and Technologies in Information Security (ATIS 2017), Auckland, New Zealand, July 6–7, 2017
  • C.W. Otterstad, “On the effectiveness of non-readable executable memory against BROP,” International Conference on Applications and Technologies in Information Security (ATIS 2017), Auckland, New Zealand, July 6–7, 2017
  • D.G.M. Mitchell and E. Rosnes, “Edge spreading design of high rate array-based SC-LDPC codes,” in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017
  • S. Kumar, E. Rosnes, and A. Graell i Amat, “Private information retrieval in distributed storage systems using an arbitrary linear code,” in Proc. IEEE International Symposium on Information Theory (ISIT), Aachen, Germany, June 2017
  • F. Armknecht, C. Boyd, G.T. Davies, K. Gjøsteen, and M. Toorani, “Side channels in deduplication: trade-offs between leakage and efficiency”, presented at the ACM Asia Conference on Computer and Communications Security (ASIACCS’17), Abu Dhabi, UAE, April 2–6, 2017

Invited talk

  • Ø. Ytrehus,”Optimum MDS convolutional codes over GF(2^m) and their relation to the trace function,” invited talk at the workshop on Mathematical Methods for Cryptography (MMC), Svolvær, Norway, Sept. 4–8, 2017 (joint work with Á. Barbero) 

2016

Journal articles

  • S. Kumar, E. Rosnes, and A. Graell i Amat, “Secure repairable fountain codes,” IEEE Communications Letters, vol. 20, no. 8, 2016, 1491–1494
  • M. Toorani, “Security analysis of the IEEE 802.15.6 standard,” International Journal of Communication Systems, vol. 29, no. 17, 2016, 2471–2489
  • O. Lysne, K.J. Hole, C.W. Otterstad, Ø. Ytrehus, R. Aarseth, and J. Tellnes, “Vendor malware: detection limits and mitigation,” IEEE Computer, vol. 49, no. 8, 2016, 62–69
  • M. Toorani, “Cryptanalysis of a robust key agreement based on public key authentication,” Journal of Security and Communication Networks, vol.9, no.1, 2016, 19–26
  • K.J. Hole, “Building trust in e-government services,” IEEE Computer, vol. 49, no. 1, 2016, 66–74

Book

  • K.J. Hole, Anti-fragile ICT Systems, Springer, 2016

Proceedings

  • C.W. Otterstad, “On trends in low-level exploitation,” NISK 2016, Bergen, Norway, November 29–30, 2016
  • Y. Yakimenka and E. Rosnes, “On failing sets of the interval-passing algorithm for compressed sensing,” in Proc. 54th Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, Sept. 27–30, 2016
  • S. Rasoolzadeh and H. Raddum, “Faster key recovery attack on round-reduced PRINCE,”  LightSec 2016, Lecture Notes in Computer Science 10098, pp. 3-17, 2016
  • S. Rasoolzadeh, “An improved truncated differential cryptanalysis of KLEIN,” Central European Conference on Cryptography, Piestany, Slovakia, June 22–24, 2016
  • S. Rasoolzadeh and H. Raddum, “Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN,” Tatra Mountains Mathematical Publication, Volume 67, 2016, pp. 149–167
  • E. Rosnes and M. Helmling, “On adaptive linear programming decoding of nonbinary linear codes over prime fields,” in Proc. 9th Int. Symp. Turbo Codes & Iterative Inf. Processing, Brest, France, Sept. 2016
  • I.E. Bocharova, B.D. Kudryashov, E. Rosnes, V. Skachek, and Ø. Ytrehus, “Wrap-around sliding-window near-ML decoding of binary LDPC codes over the BEC,” 9th International Symposium on Turbo Codes and Iterative Information Processing (ISTC), Brest, France, Sept. 5–9, 2016
  • D.N.K. Jayakody and E. Rosnes, “Spatially-coupled LDPC coding in threshold-based lossy forwarding scheme,” in Proc. IEEE 84th Veh. Tech. Conf. (VTC), Montréal, Canada, Sept. 2016
  • E. Rosnes and M. Helmling, “Constructing valid convex hull inequalities for single parity-check codes over prime fields,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Barcelona, Spain, July 10–15, 2016
  • S. Rasoolzadeh and H. Raddum, “Cryptanalysis of 6-round PRINCE using 2 known plaintexts,” presented at ArcticCrypt 2016, Longyearbyen, Svalbard, Norway, July 17–22, 2016
  • S. Rasoolzadeh and H. Raddum, “Cryptanalysis of PRINCE with minimal data,” AfricaCrypt 2016, Lecture Notes in Computer Science vol. 9646, Springer Verlag, 2016, 109–126
  • E. Rosnes and M. Helmling, “On adaptive linear programming decoding of linear codes over GF(8),” in Proc. Inf. Theory Appl. (ITA), La Jolla, CA, USA, Jan.-Feb. 2016

2015

Journal articles

  • M. Toorani, “Cryptanalysis of two PAKE protocols for body area networks and smart environments,” International Journal of Network Security, vol.17, no.5, 2015, 629–636
  • K.J. Hole, “Toward anti-fragility: a malware-halting technique,” IEEE Security & Privacy, vol. 13, no. 4, 2015, 40–46
  • K.J. Hole, “Diversity Reduces the Impact of Malware,” IEEE Security & Privacy, vol. 13, no. 3,2015, 48–54
  • O. Kazymyrov, R. Oliynykov, H. Raddum, “Influence of addition modulo 2n on algebraic attacks”, Cryptography and Communications, vol. 8, no. 2, 277–289
  • M. Toorani, “Cryptanalysis of a new protocol of wide use for e-mail with perfect forward secrecy,” Journal of Security and Communication Networks, vol.8, no.4, 2015, 694–701

Proceedings

  • Á. Barbero and Ø. Ytrehus, “A coding-based approach to robust shortest-path routing,” 4th Int. Castle Meeting on Coding Theory and its Applications, 2015
  • Á. Barbero and Ø. Ytrehus, “Network coding for cyclic networks,” Mathematical Coding Theory in Multimedia Streaming, Banff, Canada, 2015
  • E. Rosnes and M. Helmling, “On adaptive linear programming decoding of ternary linear codes,” IEEE Information Theory Workshop, 2015
  • E. Rosnes, “On the minimum distance of array-based spatially coupled low-density parity-check codes,” IEEE International Symposium on Information Theory, 2015
  • E. Rosnes and A. Graell i Amat, “Analysis of spatially-coupled counter braids,” in Proc. IEEE Inf. Theory Workshop (ITW), Jeju, Korea, Oct. 2015, 133–137
  • H. Raddum and O. Kazymyrov, “Algebraic attacks using binary decision diagrams,” BalkanCryptSec 2014, Lecture Notes in Computer Science, vol. 9024, Springer, 2015
  • H. Raddum, “Algebraic Analysis of the Simon Block Cipher Family,” LatinCrypt 2015, Lecture Notes in Computer Science, vol. 9230, 157–169, Springer, 2015
  • S. Kumar, A. Graell i Amat, I. Andriyanova, and F. Brännström, “A family of erasure correcting codes with low repair bandwidth and low repair complexity,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), San Diego, CA, USA, Dec. 2015
  • C.W. Otterstad, “A brief evaluation of Intel®MPX,” in Proc. 9th Annual IEEE InternationalSystems Conference (SysCon), Vancouver, BC, April, 2015
  • M. Toorani, “On continuous after-the-fact leakage-resilient key exchange,” in Proc. 2nd Workshop on Cryptography and Security in Computing Systems (CS2’15), Amsterdam, Netherlands, Jan. 2015
  • M. Toorani, “On vulnerabilities of the security association in the IEEE 802.15.6 standard,” Financial Cryptography and Data Security, LNCS 8976, Springer, 2015, 245–260
  • M. Toorani, “Cryptanalysis of a protocol from FC’10 (Poster Abstract),” Financial Cryptography and Data Security, LNCS 8975, Springer, 2015

Invited talks

  • M. Helmling, E. Rosnes, and S. Ruzika, “On maximum-likelihood decoding of polar codes,” invited talk at IEEE Inf. Theory Workshop (ITW), Jerusalem, Israel, April-May 2015
  • E. Rosnes and A. Graell i Amat, “On the analysis of spatially-coupled counter braids,” invited talk at Inf. Theory Appl. (ITA), La Jolla, CA, USA, Feb. 2015