Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Recovery: Inert and Public., , , and . Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 111-126. Springer, (2016)Bitcoin Unchained., , , and . ERCIM News, (2017)Cronus: Everlasting Privacy with Audit and Cast.. NordSec, volume 11875 of Lecture Notes in Computer Science, page 53-68. Springer, (2019)How not to prove your election outcome., , , and . IEEE Symposium on Security and Privacy, page 644-660. IEEE, (2020)Short Paper: An Update on Marked Mix-Nets: An Attack, a Fix and PQ Possibilities., , and . Financial Cryptography Workshops, volume 12063 of Lecture Notes in Computer Science, page 360-368. Springer, (2020)Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme., , and . IACR Cryptol. ePrint Arch., (2020)Machine-checking the universal verifiability of ElectionGuard., , and . IACR Cryptol. ePrint Arch., (2020)VOTOR: conceptually simple remote voting against tiny tyrants., and . ACSW, page 32. ACM, (2016)Key Recovery: Inert and Public., , , and . IACR Cryptology ePrint Archive, (2017)Verifiable Homomorphic Tallying for the Schulze Vote Counting Scheme., , and . VSTTE, volume 12031 of Lecture Notes in Computer Science, page 36-53. Springer, (2019)