Cryptology ePrint Archive: Report 2012/185

Available versions in chronological order


Replay attacks that violate ballot secrecy in Helios
Ben Smyth

Replay attacks that violate ballot secrecy in Helios
Ben Smyth

Replay attacks that violate ballot secrecy in Helios
Ben Smyth


[ Cryptology ePrint archive ]