Cited in
(35)- Verifiable multi-party computation with perfectly private audit trail
- Verificatum
- Surveying definitions of election verifiability
- Belenios
- Protecting the privacy of voters: new definitions of ballot secrecy for e-voting
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Strategies for voter-initiated election audits
- Post-quantum online voting scheme
- A distributed networked system for secure publicly verifiable self-tallying online voting
- Surveying global verifiability
- Privacy and verifiability in voting systems: methods, developments and trends
- Authentication with weaker trust assumptions for voting systems
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
- Belenios: a simple private and verifiable electronic voting system
- YAPA
- AVISPA
- FAST
- ProVerif
- PandA
- scyther
- Charm
- TS#
- NFLlib
- Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later
- Akiss
- ADSNARK
- JavaSPI
- TAMARIN
- CoSP
- CPSA
- Secret, verifiable auctions from elections
- Exploiting re-voting in the Helios election system
- MuSig2
- Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm
- How (not) to achieve both coercion resistance and cast as intended verifiability in remote evoting
This page was built for software: Helios