Peter Y. A. Ryan

Orcid: 0000-0002-1677-9034

Affiliations:
  • University of Luxembourg


According to our database1, Peter Y. A. Ryan authored at least 172 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hyperion: Transparent End-to-End Verifiable Voting with Coercion Mitigation.
IACR Cryptol. ePrint Arch., 2024

SweetPAKE: Key exchange with decoy passwords.
IACR Cryptol. ePrint Arch., 2024

Intelligo ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting (long version).
CoRR, 2024

Verifying Artifact Authenticity with Unclonable Optical Tags.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024

Direct and Transparent Voter Verification with Everlasting Receipt-Freeness.
Proceedings of the Electronic Voting - 9th International Joint Conference, 2024

RISC-V Instruction Set Extensions for Multi-Precision Integer Arithmetic: A Case Study on Post-Quantum Key Exchange Using CSIDH-512.
Proceedings of the 61st ACM/IEEE Design Automation Conference, 2024

X2065: Lightweight Key Exchange for the Internet of Things.
Proceedings of the 10th ACM Cyber-Physical System Security Workshop, 2024

2023
Machine-checked proofs of privacy against malicious boards for Selene & Co.
J. Comput. Secur., 2023

Introduction to the Special Issue on Ransomware.
DTRAP, 2023

IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things.
Proceedings of the Mobile, Secure, and Programmable Networking, 2023

2022
Estonian Internet voting with anonymous credentials.
Turkish J. Electr. Eng. Comput. Sci., February, 2022

Highly Vectorized SIKE for AVX-512.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Verification of the Socio-Technical Aspects of Voting: The Case of the Polish Postal Vote 2020.
CoRR, 2022

2021
Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes.
ACM Trans. Comput. Hum. Interact., 2021

Batching CSIDH Group Actions using AVX-512.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds.
Proc. Priv. Enhancing Technol., 2021

Taphonomical Security: (DNA) Information with Foreseeable Lifespan.
IACR Cryptol. ePrint Arch., 2021

Preservation of DNA Privacy During the Large Scale Detection of COVID.
IACR Cryptol. ePrint Arch., 2021

Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol.
IACR Cryptol. ePrint Arch., 2021

Security Characterization of J-PAKE and its Variants.
IACR Cryptol. ePrint Arch., 2021

User Experience Design for E-Voting: How mental models align with security mechanisms.
CoRR, 2021

Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability.
CoRR, 2021

Convergence Voting: From Pairwise Comparisons to Consensus.
CoRR, 2021

Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols.
Proceedings of the Security and Trust Management - 17th International Workshop, 2021

Cast-as-Intended: A Formal Definition and Case Studies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

"Just for the Sake of Transparency": Exploring Voter Mental Models of Verifiability.
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021

Who Was that Masked Voter? The Tally Won't Tell!
Proceedings of the Electronic Voting - 6th International Joint Conference, 2021

AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

A Declaration of Software Independence.
Proceedings of the Protocols, Strands, and Logic, 2021

2020
Verifiable Inner Product Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

Post-Quantum Anonymous Veto Networks.
IACR Cryptol. ePrint Arch., 2020

A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips.
CoRR, 2020

Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal.
CoRR, 2020

Preservation of DNA Privacy During the Large Scale Detection of COVID-19.
CoRR, 2020

High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE.
Proceedings of the E-Business and Telecommunications, 2020

Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme.
Proceedings of the Financial Cryptography and Data Security, 2020

Towards Model Checking of Voting Protocols in Uppaal.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

Revisiting Practical and Usable Coercion-Resistant Remote E-Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

Universal Unconditional Verifiability in E-Voting without Trusted Parties.
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020

Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers.
Proceedings of the Smart Card Research and Advanced Applications, 2020

2019
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2019

Authenticated Key Distribution: When the Coupon Collector is Your Enemy.
IACR Cryptol. ePrint Arch., 2019

Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking.
CoRR, 2019

Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
CoRR, 2019

A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things.
Proceedings of the Information Security Theory and Practice, 2019

Risk-Limiting Tallies.
Proceedings of the Electronic Voting - 4th International Joint Conference, 2019

An Offline Dictionary Attack Against zkPAKE Protocol.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Novel Collaborative Filtering Recommender Friendly to Privacy Protection.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

How to Assess the Usability Metrics of E-Voting Schemes.
Proceedings of the Financial Cryptography and Data Security, 2019

NoCry: No More Secure Encryption Keys for Cryptographic Ransomware.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

Security - Visible, Yet Unseen?
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics.
CoRR, 2018

CryptoRec: Secure Recommendations as a Service.
CoRR, 2018

From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions.
CoRR, 2018

HoneyPAKEs (Transcript of Discussion).
Proceedings of the Security Protocols XXVI, 2018

HoneyPAKEs.
Proceedings of the Security Protocols XXVI, 2018

Next Generation Cryptographic Ransomware.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation.
Proceedings of the Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Oslo, Norway, 2018

A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack.
Proceedings of the Information Systems Security and Privacy - 4th International Conference, 2018

A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System.
Proceedings of the 4th International Conference on Information Systems Security and Privacy, 2018

No Random, No Ransom: A Key to Stop Cryptographic Ransomware.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware.
Proceedings of the Central European Cybersecurity Conference 2018, 2018

Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Vote of Confidence?
IEEE Secur. Priv., 2017

Trustworthy exams without trusted parties.
Comput. Secur., 2017

Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Public Evidence from Secret Ballots.
Proceedings of the Electronic Voting - Second International Joint Conference, 2017

Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion).
Proceedings of the Security Protocols XXV, 2017

Auditable PAKEs: Approaching Fair Exchange Without a TTP.
Proceedings of the Security Protocols XXV, 2017

Securing the Foundations of Democracy.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Using Selene to Verify Your Vote in JCJ.
Proceedings of the Financial Cryptography and Data Security, 2017

Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware.
Proceedings of the Advances in Cybersecurity, 2017

A Brief History of Security Protocols.
Proceedings of the Concurrency, Security, and Puzzles, 2017

2016
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties.
IACR Cryptol. ePrint Arch., 2016

Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt.
Proceedings of the 1st International Workshop on AI for Privacy and Security, 2016

Crypto Santa.
Proceedings of the New Codebreakers, 2016

2015
vVote: A Verifiable Voting System.
ACM Trans. Inf. Syst. Secur., 2015

End-to-End Verifiability in Voting Systems, from Theory to Practice.
IEEE Secur. Priv., 2015

Selene: Voting with Transparent Verifiability and Coercion-Mitigation.
IACR Cryptol. ePrint Arch., 2015

End-to-end verifiability.
CoRR, 2015

Information Leakage Due to Revealing Randomly Selected Bits.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

A Secure Exam Protocol Without Trusted Parties.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

2014
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity.
IACR Cryptol. ePrint Arch., 2014

Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401).
Dagstuhl Reports, 2014

vVote: a Verifiable Voting System (DRAFT).
CoRR, 2014

Faster Print on Demand for Prêt à Voter.
Proceedings of the 2014 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, 2014

Remark!: A Secure Protocol for Remote Exams.
Proceedings of the Security Protocols XXII, 2014

Formal Analysis of Electronic Exams.
Proceedings of the SECRYPT 2014, 2014

Formal Security Analysis of Traditional and Electronic Exams.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Trapdoor Privacy in Asymmetric Searchable Encryption Schemes.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014

2013
Generalized information theory for hints.
Int. J. Approx. Reason., 2013

Prêt à Voter Providing Everlasting Privacy.
Proceedings of the E-Voting and Identify - 4th International Conference, 2013

Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Proving Prêt à Voter Receipt Free Using Computational Security Models.
Proceedings of the 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2013

Enhancements to Prepare-and-Measure Based QKD Protocols.
Proceedings of the Security Protocols XXI, 2013

Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Verifiable Postal Voting.
Proceedings of the Security Protocols XXI, 2013

Caveat Coercitor: Coercion-Evidence in Electronic Voting.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Using Prêt à Voter in Victoria State Elections.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

Foreword from the Programme Chairs - STAST 2012.
Proceedings of the 2nd Workshop on Socio-Technical Aspects in Security and Trust, 2012

A Fair and Robust Voting System by Broadcast.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission.
Proceedings of the 5th International Conference on Electronic Voting 2012, 2012

2011
Receipt Freeness of Prêt à Voter Provably Secure.
IACR Cryptol. ePrint Arch., 2011

Verifiable Elections and the Public (Dagstuhl Seminar 11281).
Dagstuhl Reports, 2011

Feasibility Analysis of Prêt à Voter for German Federal Elections.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

Prêt à Voter with Confirmation Codes.
Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2011

How to Sync with Alice.
Proceedings of the Security Protocols XIX, 2011

A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems.
Proceedings of the 2011 International Workshop on Requirements Engineering for Electronic Voting Systems, 2011

2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010

J-PAKE: Authenticated Key Exchange without PKI.
Trans. Comput. Sci., 2010

Anonymous voting by two-round public discussion.
IET Inf. Secur., 2010

A Threat Analysis of Prêt à Voter.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Virtually Perfect Democracy (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Security Protocols for Secret Santa.
Proceedings of the Security Protocols XVIII, 2010

Virtually Perfect Democracy.
Proceedings of the Security Protocols XVIII, 2010

Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.
Proceedings of the Progress in Cryptology - INDOCRYPT 2010, 2010

Pretty Good Democracy for More Expressive Voting Schemes.
Proceedings of the Computer Security, 2010

2009
Prêt à voter: a voter-verifiable voting system.
IEEE Trans. Inf. Forensics Secur., 2009

Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009

Journal of Computer SecuritySpecial Number devoted to the best papers of the Security Track at the 2006 ACM Symposium on Applied Computing.
J. Comput. Secur., 2009

Formal Modelling of a Usable Identity Management Solution for Virtual Organisations
Proceedings of the Proceedings Second Workshop on Formal Aspects of Virtual Organisations, 2009

Permutations in Prêt à Voter.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Pretty Good Democracy.
Proceedings of the Security Protocols XVII, 2009

Pretty Good Democracy.
Proceedings of the Security Protocols XVII, 2009

Experiences Gained from the first Prêt à Voter Implementation.
Proceedings of the First International Workshop on Requirements Engineering for e-Voting Systems, 2009

How Many Election Officials Does It Take to Change an Election?
Proceedings of the Foundations and Applications of Security Analysis, 2009

09311 Abstracts Collection - Classical and Quantum Information Assurance Foundations and Practice.
Proceedings of the Classical and Quantum Information Assurance Foundations and Practice, 26.07., 2009

2008
Prêt à Voter with Paillier encryption.
Math. Comput. Model., 2008

Opacity generalised to transition systems.
Int. J. Inf. Sec., 2008

Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes.
IACR Cryptol. ePrint Arch., 2008

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Remodelling the Attacker in Voting Protocols (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Remodelling the Attacker in Voting Protocols.
Proceedings of the Security Protocols XVI, 2008

Password Authenticated Key Exchange by Juggling.
Proceedings of the Security Protocols XVI, 2008

Improving the Farnel Voting Scheme.
Proceedings of the 3rd International Conference, 2008

Human Readable Paper Verification of Prêt à Voter.
Proceedings of the Computer Security, 2008

2007
Guest Editors' Preface.
Int. J. Inf. Sec., 2007

Secret Ballot Elections with Unconditional Integrity.
IACR Cryptol. ePrint Arch., 2007

A Model for System-Based Analysis of Voting Systems.
Proceedings of the Security Protocols, 2007

07311 Abstracts Collection -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

07311 Executive Summary -- Frontiers of Electronic Voting.
Proceedings of the Frontiers of Electronic Voting, 29.07. - 03.08.2007, 2007

2006
Voting Technologies and Trust.
IEEE Secur. Priv., 2006

Putting the Human Back in Voting Protocols.
Proceedings of the Security Protocols, 2006

Putting the Human Back in Voting Protocols.
Proceedings of the Security Protocols, 2006

Editorial message: special track on computer security.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Prêt à Voter with Re-encryption Mixes.
Proceedings of the Computer Security, 2006

E-voting: Dependability Requirements and Design for Dependability.
Proceedings of the The First International Conference on Availability, 2006

2005
Guest Editors' preface.
J. Comput. Secur., 2005

Special track on computer security.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A variant of the Chaum voter-verifiable scheme.
Proceedings of the POPL 2005 Workshop on Issues in the Theory of Security, 2005

A Practical Voter-Verifiable Election Scheme.
Proceedings of the Computer Security, 2005

Prospects for E-Voting.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

2004
Modelling Opacity Using Petri Nets.
Proceedings of the 2nd International Workshop on Security Issues with Petri Nets and other Computational Models, 2004

Editoral message: special track on computer security.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Modelling Dynamic Opacity Using Petri Nets with Silent Actions.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

Of Elections and Electrons.
Proceedings of the Formal Techniques, 2004

A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Shedding Light on Haunted Corners of Information Security.
Proceedings of the Communicating Sequential Processes: The First 25 Years, 2004

2003
Guest editorial overview.
IEEE J. Sel. Areas Commun., 2003

Enforcing the Unenforceable.
Proceedings of the Security Protocols, 2003

2001
Process Algebra and Non-Interference.
J. Comput. Secur., 2001

Non-Interference: Who Needs It?
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Modelling and analysis of security protocols.
Addison-Wesley-Longman, ISBN: 978-0-201-67471-2, 2001

2000
Process Algebra and Information Flow.
Proceedings of the First Irish Conference on the Mathematical Foundations of Computer Science and Information Technology, 2000

Open Questions (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

Mathematical Models of Computer Security.
Proceedings of the Foundations of Security Analysis and Design, 2000

1999
Preface.
Proceedings of the Workshop on Secure Architectures and Information Flow 1999, 1999

1998
An Attack on a Recursive Authentication Protocol. A Cautionary Tale.
Inf. Process. Lett., 1998

Panel Introduction: The Security Impact of Distributed Computing Technologies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

1996
A Genealogy of Non-Interference.
Proceedings of the Ninth IEEE Computer Security Foundations Workshop, March 10, 1996


  Loading...