Breaking verifiability and vote privacy in CHVote.
IACR Cryptol. ePrint Arch., 2025
Vote&Check: Secure Postal Voting with Reduced Trust Assumptions.
IACR Cryptol. ePrint Arch., 2024
Election Eligibility with OpenID: Turning Authentication into Transferable Proof of Eligibility.
IACR Cryptol. ePrint Arch., 2024
Code Voting: When Simplicity Meets Security.
Proceedings of the Computer Security - ESORICS 2024, 2024
Belenios with Cast as Intended.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023
Election Verifiability with ProVerif.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
Proving Unlinkability Using ProVerif Through Desynchronised Bi-Processes.
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
So Near and Yet So Far - Symbolic Verification of Distance-Bounding Protocols.
ACM Trans. Priv. Secur., 2022
Reversing, Breaking, and Fixing the French Legislative Election E-Voting Protocol.
IACR Cryptol. ePrint Arch., 2022
Themis: An On-Site Voting System with Systematic Cast-as-intended Verification and Partial Accountability.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Security Analysis and Implementation of Relay-Resistant Contactless Payments.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Symbolic Verification of Distance Bounding Protocols.
Proceedings of the Principles of Security and Trust - 8th International Conference, 2019
Symbolic Analysis of Terrorist Fraud Resistance.
Proceedings of the Computer Security - ESORICS 2019, 2019
A Symbolic Framework to Analyse Physical Proximity in Security Protocols.
Proceedings of the 38th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2018