B. Adida, Helios: Web-based open-audit voting, 17th USENIX Security Symposium, pp.335-348, 2008.

B. Adida and C. Neff, Ballot casting assurance, USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'06, 2006.

M. Backes, M. Gagné, and M. Skoruppa, Using mobile device communication to strengthen e-voting protocols, Sadeghi and Foresti, vol.50, pp.237-242

M. Bellare, J. Kilian, and P. Rogaway, The security of the cipher block chaining message authentication code, J. Comput. Syst. Sci, vol.61, issue.3, pp.362-399, 2000.

M. Bellare, T. Ristenpart, P. Rogaway, and T. Stegers, Format-preserving encryption, Selected Areas in Cryptography, SAC 2009, pp.295-312, 2009.

J. Benaloh, Ballot casting assurance via voter-initiated poll station auditing, USENIX/ACCURATE Electronic Voting Technology Workshop, EVT'07, 2007.

J. Daniel-cohen and . Benaloh, Verifiable Secret-ballot Elections, 1987.

D. Bernhard, V. Cortier, D. Galindo, O. Pereira, and B. Warinschi, SoK: A comprehensive analysis of game-based ballot privacy definitions, IEEE Symposium on Security and Privacy, pp.499-516, 2015.

D. Bernhard, O. Pereira, and B. Warinschi, How not to prove yourself: Pitfalls of the Fiat-Shamir heuristic and applications to Helios, Advances in Cryptology -ASIACRYPT 2012, pp.626-643, 2012.

J. Black and P. Rogaway, Ciphers with arbitrary finite domains, Topics in Cryptology -CT-RSA, pp.114-130, 2002.

C. Burton, C. Culnane, J. Heather, T. Peacock, Y. A. Peter et al., A supervised verifiable voting protocol for the victorian electoral commission, 5th International Conference on Electronic Voting, vol.205, pp.81-94, 2012.

L. Carter and M. N. Wegman, Universal classes of hash functions, J. Comput. Syst. Sci, vol.18, issue.2, pp.143-154, 1979.

P. Chaidos, V. Cortier, G. Fuchsbauer, and D. Galindo, BeleniosRF: A non-interactive receipt-free electronic voting scheme, ACM SIGSAC Conference on Computer and Communications Security, pp.1614-1625, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01377917

D. Chaum, Y. A. Peter, S. A. Ryan, and . Schneider, A practical voter-verifiable election scheme, Computer Security -ESORICS 2005, 10th European Symposium on Research in Computer Security, pp.118-139, 2005.

M. R. Clarkson, S. Chong, and A. C. Myers, Civitas: Toward a secure voting system, 2008 IEEE Symposium on Security and Privacy (S&P 2008), pp.354-368, 2008.

V. Cortier, C. Constantin, F. At?-alin-dr?-agan, B. Dupressoir, P. Schmidt et al., Machinechecked proofs of privacy for electronic voting protocols, IEEE Symposium on Security and Privacy, pp.993-1008, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01624270

V. Cortier and D. Galindo, Stéphane Glondu, and Malika Izabachène. Distributed ElGamal à la Pedersen: Application to Helios, Sadeghi and Foresti, vol.50, pp.131-142

V. Cortier, D. Galindo, S. Glondu, and M. Izabachène, Election verifiability for Helios under weaker trust assumptions, Computer Security -ESORICS 2014 -19th European Symposium on Research in Computer Security, pp.327-344, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011294

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, Election verifiability for Helios under weaker trust assumptions, European Symposium on Research in Computer Security, pp.327-344, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011294

V. Cortier and J. Lallemand, Voting: You can't have privacy without individual verifiability, Proceedings of the, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01900086

, ACM SIGSAC Conference on Computer and Communications Security, pp.53-66, 2018.

V. Cortier and B. Smyth, Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013.
URL : https://hal.archives-ouvertes.fr/inria-00638556

R. Cramer, R. Gennaro, and B. Schoenmakers, A secure and optimally efficient multi-authority election scheme, Transactions on Emerging Telecommunications Technologies, vol.8, issue.5, pp.481-490, 1997.

S. Delaune, S. Kremer, and M. Ryan, Verifying privacytype properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.

, Easycrypt: Computer-aided cryptographic proofs

T. E. Gamal, A public key cryptosystem and a signature scheme based on discrete logarithms, Advances in Cryptology, Proceedings of CRYPTO '84, pp.10-18, 1984.

K. Gjøsteen, The norwegian internet voting protocol, E-Voting and Identity, vol.7187, pp.1-18, 2011.

O. Goldreich, S. Goldwasser, and S. Micali, On the cryptographic applications of random functions, Proceedings of CRYPTO 1985

S. Goldwasser and S. Micali, Probabilistic encryption, Journal of Computer and System Sciences, vol.28, issue.2, pp.270-299, 1984.

L. Grégoire, Comment mon ordinateur a voté à ma place, 2012.

S. Gurchetan, M. Grewal, S. Dermot-ryan, P. Y. Bursuc, and . Ryan, Caveat coercitor: Coercion-evidence in electronic voting, IEEE Symposium on Security and Privacy, SP 2013, pp.367-381, 2013.

S. Gurchetan, M. Grewal, L. Dermot-ryan, M. R. Chen, and . Clarkson, Du-vote: Remote electronic voting with untrusted computers, IEEE Computer Security Foundations Symposium, CSF 2015, pp.155-169, 2015.

, Computer Security -ESORICS 2010, 15th European Symposium on Research in Computer Security, vol.6345, 2010.

S. Halevi and H. Krawczyk, MMH: software message authentication in the gbit/second rates, Fast Software Encryption, FSE '97, vol.1267, pp.172-189, 1997.

J. Heather, Y. A. Peter, V. Ryan, and . Teague, Pretty good democracy for more expressive voting schemes, vol.32, pp.405-423

S. Heiberg, H. Lipmaa, and F. Van-laenen, On e-vote integrity in the case of malicious voter computers, vol.32, pp.373-388

M. Hirt and K. Sako, Efficient receipt-free voting based on homomorphic encryption, Advances in Cryptology -EUROCRYPT 2000, pp.539-556, 2000.

M. Jakobsson, A. Juels, and R. L. Rivest, Making mix nets robust for electronic voting by randomized partial checking, Proceedings of the 11th USENIX Security Symposium, pp.339-353, 2002.

A. Juels, D. Catalano, and M. Jakobsson, Coercion-resistant electronic elections, Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, pp.61-70, 2005.

F. Karayumak, M. Maina, M. Olembo, M. Kauer, and . Volkamer, Usability analysis of helios -an open source verifiable remote electronic voting system, Proc. Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE'11), 2011.

J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2014.

S. Kremer and P. B. Rønne, To du or not to du: A security analysis of du-vote, IEEE European Symposium on Security and Privacy, pp.473-486, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01238894

S. Kremer, M. Ryan, and B. Smyth, Election verifiability in electronic voting protocols, vol.32, pp.389-404

R. Küsters, T. Truderung, and A. Vogt, Accountability: definition and relationship to verifiability, Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, pp.526-535, 2010.

C. and A. Neff, A verifiable secret shuffle and its application to evoting, CCS 2001, ACM Conference on Computer and Communications Security, pp.116-125, 2001.

P. Paillier, Public-key cryptosystems based on composite degree residuosity classes, Advances in Cryptology -EUROCRYPT '99, vol.1592, pp.223-238, 1999.

P. Torben and . Pedersen, A threshold cryptosystem without a trusted party (extended abstract), Advances in Cryptology -EUROCRYPT '91, pp.522-526, 1991.

B. Peter and . Rønne,

Y. A. Peter, D. Ryan, J. Bismark, S. Heather, Z. Schneider et al., Prêt à voter: a voter-verifiable voting system, IEEE Trans. Information Forensics and Security, vol.4, issue.4, pp.662-673, 2009.

Y. A. Peter, S. A. Ryan, and . Schneider, Prêt à voter with re-encryption mixes, ESORICS 2006, 11th European Symposium on Research in Computer Security, pp.313-326, 2006.

, Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, 2013.

B. Smyth, A foundation for secret, verifiable elections. IACR Cryptology ePrint Archive, p.225, 2018.

B. Smyth and D. Bernhard, Ballot secrecy and ballot independence coincide, Computer Security -ESORICS 2013 -18th European Symposium on Research in Computer Security, pp.463-480, 2013.
DOI : 10.1007/978-3-642-40203-6_26

URL : https://hal.archives-ouvertes.fr/hal-00863370

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security analysis of the estonian internet voting system, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.703-715, 2014.
DOI : 10.1145/2660267.2660315

URL : http://dl.acm.org/ft_gateway.cfm?id=2660315&type=pdf

N. Mark, L. Wegman, and . Carter, New hash functions and their use in authentication and set equality, J. Comput. Syst. Sci, vol.22, issue.3, pp.265-279, 1981.