Author of the publication

BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device.

, , and . CSF, page 367-381. IEEE, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Electronic Voting: Definitions and Analysis Techniques. (Vote électronique : définitions et techniques d'analyse).. University of Lorraine, Nancy, France, (2019)Equivalence Properties by Typing in Cryptographic Branching Protocols., , , and . POST, volume 10804 of Lecture Notes in Computer Science, page 160-187. Springer, (2018)Refining Authenticated Key Agreement with Strong Adversaries., , and . EuroS&P, page 92-107. IEEE, (2017)A Higher-Order Indistinguishability Logic for Cryptographic Reasoning., , and . LICS, page 1-13. (2023)A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer., , , , , , , , and . SP, page 1162-1178. IEEE, (2021)A Type System for Privacy Properties (Technical Report)., , , and . CoRR, (2017)BeleniosVS: Secrecy and Verifiability Against a Corrupted Voting Device., , and . CSF, page 367-381. IEEE, (2019)Fifty Shades of Ballot Privacy: Privacy against a Malicious Board., , and . CSF, page 17-32. IEEE, (2020)Voting: You Can't Have Privacy without Individual Verifiability., and . ACM Conference on Computer and Communications Security, page 53-66. ACM, (2018)A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer., , , , , , , , and . IACR Cryptol. ePrint Arch., (2020)