Cryptology ePrint Archive: Report 2015/942

Available versions in chronological order


Secrecy and independence for election schemes
Ben Smyth

Secrecy and independence for election schemes
Ben Smyth

Secrecy and independence for election schemes
Ben Smyth

Secrecy and independence for election schemes
Ben Smyth

Secrecy and independence for election schemes
Ben Smyth

Secrecy and independence for election schemes
Ben Smyth

Secrecy and independence for election schemes
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth

Ballot secrecy: Security definition, sufficient conditions, and analysis of Helios
Ben Smyth
Original publication (with minor differences): Journal of Computer Security


[ Cryptology ePrint archive ]