2024
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation.
IACR Cryptol. ePrint Arch., 2024
SweetPAKE: Key exchange with decoy passwords.
IACR Cryptol. ePrint Arch., 2024
Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version).
CoRR, 2024
Verifying Artifact Authenticity with Unclonable Optical Tags.
Proceedings of the 21st International Conference on Security and Cryptography, 2024
"You Shall Not Abstain!" A Formal Study of Forced Participation.
Proceedings of the Financial Cryptography and Data Security. FC 2024 International Workshops, 2024
Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
Direct and Transparent Voter Verification with Everlasting Receipt-Freeness.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024
RISC-V Instruction Set Extensions for Multi-Precision Integer Arithmetic: A Case Study on Post-Quantum Key Exchange Using CSIDH-512.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024
X2065: Lightweight Key Exchange for the Internet of Things.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024
2023
Machine-checked proofs of privacy against malicious boards for Selene & Co.
J. Comput. Secur., 2023
Introduction to the Special Issue on Ransomware.
DTRAP, 2023
IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023
2022
Estonian Internet voting with anonymous credentials.
Turkish J. Electr. Eng. Comput. Sci., February, 2022
Highly Vectorized SIKE for AVX-512.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020.
CoRR, 2022
2021
Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes.
ACM Trans. Comput. Hum. Interact., 2021
Batching CSIDH Group Actions using AVX-512.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds.
Proc. Priv. Enhancing Technol., 2021
Taphonomical Security: (DNA) Information with Foreseeable Lifespan.
IACR Cryptol. ePrint Arch., 2021
Preservation of DNA Privacy During the Large Scale Detection of COVID.
IACR Cryptol. ePrint Arch., 2021
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol.
IACR Cryptol. ePrint Arch., 2021
Security Characterization of J-PAKE and its Variants.
IACR Cryptol. ePrint Arch., 2021
User Experience Design for E-Voting: How mental models align with security mechanisms.
CoRR, 2021
Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability.
CoRR, 2021
Convergence Voting: From Pairwise Comparisons to Consensus.
CoRR, 2021
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Cast-as-Intended: A Formal Definition and Case Studies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
"Just for the Sake of Transparency": Exploring Voter Mental Models of Verifiability.
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021
Who Was that Masked Voter? The Tally Won't Tell!
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021
AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
A Declaration of Software Independence.
Proceedings of the Protocols, Strands, and Logic, 2021
2020
Verifiable Inner Product Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020
Post-Quantum Anonymous Veto Networks.
IACR Cryptol. ePrint Arch., 2020
A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips.
CoRR, 2020
Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal.
CoRR, 2020
Preservation of DNA Privacy During the Large Scale Detection of COVID-19.
CoRR, 2020
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.
Proceedings of the E-Business and Telecommunications, 2020
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme.
Proceedings of the Financial Cryptography and Data Security, 2020
Towards Model Checking of Voting Protocols in Uppaal.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020
Universal Unconditional Verifiability in E-Voting without Trusted Parties.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers.
Proceedings of the Smart Card Research and Advanced Applications, 2020
2019
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2019
Authenticated Key Distribution: When the Coupon Collector is Your Enemy.
IACR Cryptol. ePrint Arch., 2019
Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking.
CoRR, 2019
Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
CoRR, 2019
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things.
Proceedings of the Information Security Theory and Practice, 2019
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019
An Offline Dictionary Attack Against zkPAKE Protocol.
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Novel Collaborative Filtering Recommender Friendly to Privacy Protection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
How to Assess the Usability Metrics of E-Voting Schemes.
Proceedings of the Financial Cryptography and Data Security, 2019
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019
Security - Visible, Yet Unseen?
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019
2018
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics.
CoRR, 2018
CryptoRec: Secure Recommendations as a Service.
CoRR, 2018
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018
HoneyPAKEs (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the Security Protocols XXVI, 2018
Next Generation Cryptographic Ransomware.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018
No Random, No Ransom: A Key to Stop Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware.
Proceedings of the Central European Cybersecurity Conference 2018, 2018
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Trustworthy exams without trusted parties.
Comput. Secur., 2017
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017
Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017
Auditable PAKEs: Approaching Fair Exchange Without a TTP.
Proceedings of the Security Protocols XXV, 2017
Securing the Foundations of Democracy.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Using Selene to Verify Your Vote in JCJ.
Proceedings of the Financial Cryptography and Data Security, 2017
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware.
Proceedings of the Advances in Cybersecurity, 2017
A Brief History of Security Protocols.
Proceedings of the Concurrency, Security, and Puzzles, 2017
2016
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
IACR Cryptol. ePrint Arch., 2016
Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016
Proceedings of the New Codebreakers, 2016
2015
vVote: A Verifiable Voting System.
ACM Trans. Inf. Syst. Secur., 2015
End-to-End Verifiability in Voting Systems, from Theory to Practice.
IEEE Secur. Priv., 2015
Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
IACR Cryptol. ePrint Arch., 2015
End-to-end verifiability.
CoRR, 2015
Information Leakage Due to Revealing Randomly Selected Bits.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015
A Secure Exam Protocol Without Trusted Parties.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
2014
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptol. ePrint Arch., 2014
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014
vVote: a Verifiable Voting System (DRAFT).
CoRR, 2014
Faster Print on Demand for Prêt à Voter.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014
Remark!: A Secure Protocol for Remote Exams.
Proceedings of the Security Protocols XXII, 2014
Formal Analysis of Electronic Exams.
Proceedings of the SECRYPT 2014, 2014
Formal Security Analysis of Traditional and Electronic Exams.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
Generalized information theory for hints.
Int. J. Approx. Reason., 2013
Prêt à Voter Providing Everlasting Privacy.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Proving Prêt à Voter Receipt Free Using Computational Security Models.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013
Enhancements to Prepare-and-Measure Based QKD Protocols.
Proceedings of the Security Protocols XXI, 2013
Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013
Verifiable Postal Voting.
Proceedings of the Security Protocols XXI, 2013
Caveat Coercitor: Coercion-Evidence in Electronic Voting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
2012
Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Foreword from the Programme Chairs - STAST 2012.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012
A Fair and Robust Voting System by Broadcast.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012
2011
Receipt Freeness of Prêt à Voter Provably Secure.
IACR Cryptol. ePrint Arch., 2011
Verifiable Elections and the Public (Dagstuhl Seminar 11281).
Dagstuhl Reports, 2011
Feasibility Analysis of Prêt à Voter for German Federal Elections.
Proceedings of the E-Voting and Identity - Third International Conference, 2011
Prêt à Voter with Confirmation Codes.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011
Proceedings of the Security Protocols XIX, 2011
A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011
2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010
J-PAKE: Authenticated Key Exchange without PKI.
Trans. Comput. Sci., 2010
Anonymous voting by two-round public discussion.
IET Inf. Secur., 2010
A Threat Analysis of Prêt à Voter.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Virtually Perfect Democracy (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010
Security Protocols for Secret Santa.
Proceedings of the Security Protocols XVIII, 2010
Virtually Perfect Democracy.
Proceedings of the Security Protocols XVIII, 2010
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010
Pretty Good Democracy for More Expressive Voting Schemes.
Proceedings of the Computer Security, 2010
2009
Prêt à voter: a voter-verifiable voting system.
IEEE Trans. Inf. Forensics Secur., 2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009
Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
J. Comput. Secur., 2009
Formal Modelling of a Usable Identity Management Solution for Virtual Organisations
Proceedings of the Proceedings Second Workshop on Formal Aspects of Virtual Organisations, 2009
Permutations in Prêt à Voter.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009
Proceedings of the Security Protocols XVII, 2009
Proceedings of the Security Protocols XVII, 2009
Experiences Gained from the first Prêt à Voter Implementation.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009
How Many Election Officials Does It Take to Change an Election?
Proceedings of the Foundations and Applications of Security Analysis, 2009
09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice.
Proceedings of the Classical and Quantum Information Assurance Foundations and Practice, 26.07., 2009
2008
Prêt à Voter with Paillier encryption.
Math. Comput. Model., 2008
Opacity generalised to transition systems.
Int. J. Inf. Sec., 2008
Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes.
IACR Cryptol. ePrint Arch., 2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Remodelling the Attacker in Voting Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008
Remodelling the Attacker in Voting Protocols.
Proceedings of the Security Protocols XVI, 2008
Password Authenticated Key Exchange by Juggling.
Proceedings of the Security Protocols XVI, 2008
Improving the Farnel Voting Scheme.
Proceedings of the 3rd International Conference, 2008
Human Readable Paper Verification of Prêt à Voter.
Proceedings of the Computer Security, 2008
2007
Secret Ballot Elections with Unconditional Integrity.
IACR Cryptol. ePrint Arch., 2007
A Model for System-Based Analysis of Voting Systems.
Proceedings of the Security Protocols, 2007
07311 Abstracts Collection -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
07311 Executive Summary -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007
2006
Voting Technologies and Trust.
IEEE Secur. Priv., 2006
Putting the Human Back in Voting Protocols.
Proceedings of the Security Protocols, 2006
Putting the Human Back in Voting Protocols.
Proceedings of the Security Protocols, 2006
Editorial message: special track on computer security.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Prêt à Voter with Re-encryption Mixes.
Proceedings of the Computer Security, 2006
E-voting: Dependability Requirements and Design for Dependability.
Proceedings of the The First International Conference on Availability, 2006
2005
Special track on computer security.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
A variant of the Chaum voter-verifiable scheme.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005
A Practical Voter-Verifiable Election Scheme.
Proceedings of the Computer Security, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
2004
Modelling Opacity Using Petri Nets.
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004
Editoral message: special track on computer security.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Modelling Dynamic Opacity Using Petri Nets with Silent Actions.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004
Of Elections and Electrons.
Proceedings of the Formal Techniques, 2004
A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
Shedding Light on Haunted Corners of Information Security.
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004
2003
Guest editorial overview.
IEEE J. Sel. Areas Commun., 2003
Enforcing the Unenforceable.
Proceedings of the Security Protocols, 2003
2001
Process Algebra and Non-Interference.
J. Comput. Secur., 2001
Non-Interference: Who Needs It?
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Modelling and analysis of security protocols.
Addison-Wesley-Longman, ISBN: 978-0-201-67471-2, 2001
2000
Process Algebra and Information Flow.
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000
Open Questions (Transcript of Discussion).
Proceedings of the Security Protocols, 2000
Mathematical Models of Computer Security.
Proceedings of the Foundations of Security Analysis and Design, 2000
1999
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999
1998
An Attack on a Recursive Authentication Protocol. A Cautionary Tale.
Inf. Process. Lett., 1998
Panel Introduction: The Security Impact of Distributed Computing Technologies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
1996
A Genealogy of Non-Interference.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996