Author of the publication

Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.

, , , and . CoRR, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits., and . CoRR, (2018)On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields., , and . CoRR, (2018)A new security proof for Damgård's ElGamal.. IACR Cryptology ePrint Archive, (2004)Protocol Variants and Electronic Identification.. IACR Cryptology ePrint Archive, (2013)Side Channels in Deduplication: Trade-offs between Leakage and Efficiency., , , , and . AsiaCCS, page 266-274. ACM, (2017)A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability., and . Financial Cryptography Workshops, volume 10323 of Lecture Notes in Computer Science, page 404-418. Springer, (2017)Highly Efficient Key Exchange Protocols with Optimal Tightness., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 767-797. Springer, (2019)A framework for compositional verification of security protocols., , , , , and . Inf. Comput., 206 (2-4): 425-459 (2008)An experiment on the security of the Norwegian electronic voting protocol., and . Annales des Télécommunications, 71 (7-8): 299-307 (2016)Spreading Alerts Quietly and the Subgroup Escape Problem., , , , and . J. Cryptology, 28 (4): 796-819 (2015)