Helios: Web-based open-audit voting, 17th USENIX Security Symposium, pp.335-348, 2008. ,
Ballot casting assurance, USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'06, 2006. ,
Using mobile device communication to strengthen e-voting protocols, Sadeghi and Foresti, vol.50, pp.237-242 ,
The security of the cipher block chaining message authentication code, J. Comput. Syst. Sci, vol.61, issue.3, pp.362-399, 2000. ,
Format-preserving encryption, Selected Areas in Cryptography, SAC 2009, pp.295-312, 2009. ,
Ballot casting assurance via voter-initiated poll station auditing, USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'07, 2007. ,
Verifiable Secret-ballot Elections, 1987. ,
SoK: A comprehensive analysis of game-based ballot privacy definitions, IEEE Symposium on Security and Privacy, pp.499-516, 2015. ,
How not to prove yourself: Pitfalls of the Fiat-Shamir heuristic and applications to Helios, Advances in Cryptology -ASIACRYPT 2012, pp.626-643, 2012. ,
Ciphers with arbitrary finite domains, Topics in Cryptology -CT-RSA, pp.114-130, 2002. ,
A supervised verifiable voting protocol for the victorian electoral commission, 5th International Conference on Electronic Voting, vol.205, pp.81-94, 2012. ,
Universal classes of hash functions, J. Comput. Syst. Sci, vol.18, issue.2, pp.143-154, 1979. ,
BeleniosRF: A non-interactive receipt-free electronic voting scheme, ACM SIGSAC Conference on Computer and Communications Security, pp.1614-1625, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01377917
A practical voter-verifiable election scheme, Computer Security -ESORICS 2005, 10th European Symposium on Research in Computer Security, pp.118-139, 2005. ,
Civitas: Toward a secure voting system, 2008 IEEE Symposium on Security and Privacy (S&P 2008), pp.354-368, 2008. ,
Machinechecked proofs of privacy for electronic voting protocols, IEEE Symposium on Security and Privacy, pp.993-1008, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01624270
Stéphane Glondu, and Malika Izabachène. Distributed ElGamal à la Pedersen: Application to Helios, Sadeghi and Foresti, vol.50, pp.131-142 ,
Election verifiability for Helios under weaker trust assumptions, Computer Security -ESORICS 2014 -19th European Symposium on Research in Computer Security, pp.327-344, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01011294
Election verifiability for Helios under weaker trust assumptions, European Symposium on Research in Computer Security, pp.327-344, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01011294
Voting: You can't have privacy without individual verifiability, Proceedings of the, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01900086
, ACM SIGSAC Conference on Computer and Communications Security, pp.53-66, 2018.
Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013. ,
URL : https://hal.archives-ouvertes.fr/inria-00638556
A secure and optimally efficient multi-authority election scheme, Transactions on Emerging Telecommunications Technologies, vol.8, issue.5, pp.481-490, 1997. ,
Verifying privacytype properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009. ,
, Easycrypt: Computer-aided cryptographic proofs
A public key cryptosystem and a signature scheme based on discrete logarithms, Advances in Cryptology, Proceedings of CRYPTO '84, pp.10-18, 1984. ,
The norwegian internet voting protocol, E-Voting and Identity, vol.7187, pp.1-18, 2011. ,
On the cryptographic applications of random functions, Proceedings of CRYPTO 1985 ,
Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984. ,
Comment mon ordinateur a voté à ma place, 2012. ,
Caveat coercitor: Coercion-evidence in electronic voting, IEEE Symposium on Security and Privacy, SP 2013, pp.367-381, 2013. ,
Du-vote: Remote electronic voting with untrusted computers, IEEE Computer Security Foundations Symposium, CSF 2015, pp.155-169, 2015. ,
, Computer Security -ESORICS 2010, 15th European Symposium on Research in Computer Security, vol.6345, 2010.
MMH: software message authentication in the gbit/second rates, Fast Software Encryption, FSE '97, vol.1267, pp.172-189, 1997. ,
Pretty good democracy for more expressive voting schemes, vol.32, pp.405-423 ,
On e-vote integrity in the case of malicious voter computers, vol.32, pp.373-388 ,
Efficient receipt-free voting based on homomorphic encryption, Advances in Cryptology -EUROCRYPT 2000, pp.539-556, 2000. ,
Making mix nets robust for electronic voting by randomized partial checking, Proceedings of the 11th USENIX Security Symposium, pp.339-353, 2002. ,
Coercion-resistant electronic elections, Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp.61-70, 2005. ,
Usability analysis of helios -an open source verifiable remote electronic voting system, Proc. Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE'11), 2011. ,
Introduction to Modern Cryptography, 2014. ,
To du or not to du: A security analysis of du-vote, IEEE European Symposium on Security and Privacy, pp.473-486, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01238894
Election verifiability in electronic voting protocols, vol.32, pp.389-404 ,
Accountability: definition and relationship to verifiability, Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp.526-535, 2010. ,
A verifiable secret shuffle and its application to evoting, CCS 2001, ACM Conference on Computer and Communications Security, pp.116-125, 2001. ,
Public-key cryptosystems based on composite degree residuosity classes, Advances in Cryptology -EUROCRYPT '99, vol.1592, pp.223-238, 1999. ,
A threshold cryptosystem without a trusted party (extended abstract), Advances in Cryptology -EUROCRYPT '91, pp.522-526, 1991. ,
,
Prêt à voter: a voter-verifiable voting system, IEEE Trans. Information Forensics and Security, vol.4, issue.4, pp.662-673, 2009. ,
Prêt à voter with re-encryption mixes, ESORICS 2006, 11th European Symposium on Research in Computer Security, pp.313-326, 2006. ,
, Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, 2013.
A foundation for secret, verifiable elections. IACR Cryptology ePrint Archive, p.225, 2018. ,
Ballot secrecy and ballot independence coincide, Computer Security -ESORICS 2013 -18th European Symposium on Research in Computer Security, pp.463-480, 2013. ,
DOI : 10.1007/978-3-642-40203-6_26
URL : https://hal.archives-ouvertes.fr/hal-00863370
Security analysis of the estonian internet voting system, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.703-715, 2014. ,
DOI : 10.1145/2660267.2660315
URL : http://dl.acm.org/ft_gateway.cfm?id=2660315&type=pdf
New hash functions and their use in authentication and set equality, J. Comput. Syst. Sci, vol.22, issue.3, pp.265-279, 1981. ,