Cryptology ePrint Archive: Report 2010/625

Available versions in chronological order


Does Helios ensure ballot secrecy?
Ben Smyth and Veronique Cortier

Does Helios ensure ballot secrecy?
Ben Smyth and Veronique Cortier

Does Helios ensure ballot secrecy?
Ben Smyth and Veronique Cortier

Attacking and fixing Helios: An analysis of ballot secrecy
Ben Smyth and Veronique Cortier

Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: CSF'11: 24th IEEE Computer Security Foundations Symposium

Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: A preliminary version of this article was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11)

Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: This document is a preprint of an article accepted by the Journal of Computer Security. A preliminary version was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11).

Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: This document is a preprint of a Journal of Computer Security article and a preliminary version was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11).

Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Publication Info: This document is a preprint of a Journal of Computer Security article and a preliminary version was presented at the 24th IEEE Computer Security Foundations Symposium (CSF'11).

Attacking and fixing Helios: An analysis of ballot secrecy
Veronique Cortier and Ben Smyth
Original publication (with minor differences): Journal of Computer Security, 21(1), pp. 89-148, 2013 and 24th Computer Security Foundations Symposium (CSF'11), IEEE Computer Society, pp. 297-311, 2011.


[ Cryptology ePrint archive ]