Now showing items 1-4 of 4

    • Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing 

      Silde, Tjerand; Strand, Martin (2022-10-22)
      Anonymous single-use tokens have seen recent applications in private Internet browsing and anonymous statistics collection. We develop new schemes in order to include public metadata such as expiration dates for tokens. ...
    • Formalizing swarm security 

      Strand, Martin (2022-01-24)
      Cheap, capable processors are becoming readily available, and these are being deployed to a wide variety of applications, ranging from internet-enabled refrigerators to swarms of specialised drones. As often is the case ...
    • Security for Autonomous and Unmanned Devices: Cryptography and its Limits 

      Strand, Martin; Wiik, Jan Henrik (2022-02-07)
      We survey existing literature on protecting resource constrained autonomous and unmanned devices. The goal is to secure data both during transmission and at rest, also when facing highly skilled and motivated adversaries. ...
    • A Status Update on Quantum Safe Cryptography 

      Strand, Martin (2021-07-20)
      There is an ongoing effort to standardize asymmetric cryptography that should not be attackable by a quantum computer. The process is now into its final rounds. From 69 initial submissions from academia and industry, a ...