Cryptology ePrint Archive: Report 2010/625
Available versions in chronological order
20101208:231546 (posted 08-Dec-2010 23:15:46 UTC)
Does Helios ensure ballot secrecy?
Ben Smyth and Veronique Cortier
20101213:090633 (posted 13-Dec-2010 09:06:33 UTC)
Does Helios ensure ballot secrecy?
Ben Smyth and Veronique Cortier
20101217:132825 (posted 17-Dec-2010 13:28:25 UTC)
Does Helios ensure ballot secrecy?
Ben Smyth and Veronique Cortier
20110321:170045 (posted 21-Mar-2011 17:00:45 UTC)
Attacking and fixing Helios: An analysis of ballot secrecy
Ben Smyth and Veronique Cortier
20110601:121716 (posted 01-Jun-2011 12:17:16 UTC)
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: CSF'11: 24th IEEE Computer Security Foundations Symposium
20111110:012334 (posted 10-Nov-2011 01:23:34 UTC)
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: A preliminary version of this article was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11)
20120525:011741 (posted 25-May-2012 01:17:41 UTC)
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: This document is a preprint of an article accepted by the Journal of Computer Security. A preliminary version was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11).
20120827:145856 (posted 27-Aug-2012 14:58:56 UTC)
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: This document is a preprint of a Journal of Computer Security article and a preliminary version was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11).
20120827:145942 (posted 27-Aug-2012 14:59:42 UTC)
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: This document is a preprint of a Journal of Computer Security article and a preliminary version was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11).
20130925:103829 (posted 25-Sep-2013 10:38:29 UTC)
Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Original publication (with minor differences): Journal of Computer Security, 21(1), pp. 89-148, 2013 and 24th Computer Security Foundations Symposium (CSF'11), IEEE Computer Society, pp. 297-311, 2011.
[
Cryptology ePrint archive
]