B. Adida, Helios: Web-based Open-Audit Voting, USENIX Security'08: 17th USENIX Security Symposium, pp.335-348, 2008.

B. Adida, O. De-marneffe, O. Pereira, and J. Quisquater, Electing a University President Using Open-Audit Voting: Analysis of Real- World Use of Helios, 2009.

J. B. Almeida, M. Barbosa, G. Barthe, G. Davy, F. Dupressoir et al., Verified Implementations for Secure and Verifiable Computation, Cryptology ePrint Archive, vol.456456, 2014.

J. B. Almeida, M. Barbosa, G. Barthe, and F. Dupressoir, Certified computer-aided cryptography, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1217-1230, 2013.
DOI : 10.1145/2508859.2516652

J. B. Almeida, M. Barbosa, G. Barthe, and F. Dupressoir, Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC, FSE'16: 23rd International Conference on Fast Software Encryption, 2016.
DOI : 10.1007/3-540-46035-7_35

G. Barthe, J. M. Crespo, Y. Lakhnech, and B. Schmidt, Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols, EUROCRYPT'15: 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.689-718, 2015.
DOI : 10.1007/978-3-662-46803-6_23

G. Barthe, F. Dupressoir, B. Grégoire, C. Kunz, B. Schmidt et al., EasyCrypt: A Tutorial, Foundations of Security Analysis and Design VII, pp.146-166, 2014.
DOI : 10.1145/1594834.1480894

URL : https://hal.archives-ouvertes.fr/hal-01114366

G. Barthe, B. Grégoire, S. Heraud, and S. Zanella-béguelin, Computer-Aided Security Proofs for the Working Cryptographer, CRYPTO'11: 31st Annual Cryptology Conference, pp.71-90, 2011.
DOI : 10.1007/978-3-642-22792-9_5

URL : https://hal.archives-ouvertes.fr/hal-01112075

M. Bellare and G. Neven, Multi-signatures in the plain publickey model and a general forking lemma, CCS'06: 13th ACM conference on Computer and Communications Security, pp.390-399, 2006.

N. Benton, Simple Relational Correctness Proofs for Static Analyses and Program Transformations, POPL '04: 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, p.43, 2004.

D. Bernhard, Zero-Knowledge Proofs in Theory and Practice, 2014.

D. Bernhard, V. Cortier, D. Galindo, O. Pereira, B. Warinschi14 et al., SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions Adapting Helios for Provable Ballot Privacy, S&P'15: 36th IEEE Symposium on Security and Privacy ESORICS'11: 16th European Symposium on Research in Computer Security, pp.499-516, 2011.

D. Bernhard, O. Pereira, and B. Warinschi, How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, ASIACRYPT'12: 18th International Conference on the Theory and Application of Cryptology and Information Security, pp.626-643, 2012.
DOI : 10.1007/978-3-642-34961-4_38

D. Bernhard and B. Warinschi, Cryptographic Voting ??? A Gentle Introduction, Foundations of Security Analysis and Design VII -FOSAD 2012, pp.167-211, 2013.
DOI : 10.3233/JCS-2012-0458

B. Blanchet, An Automatic Security Protocol Verifier based on Resolution Theorem Proving (invited tutorial), 20th International Conference on Automated Deduction (CADE-20), 2005.

D. Chaum and T. P. Pedersen, Wallet Databases with Observers, CRYPTO'92: 12th Annual International Cryptology Conference, pp.89-105, 1992.
DOI : 10.1007/3-540-48071-4_7

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-90, 1981.
DOI : 10.1145/358549.358563

V. Cortier, F. Eigner, S. Kremer, M. Maffei, and C. Wiedling, Type-Based Verification of Electronic Voting Protocols, POST'15: 4th Conference on Principles of Security and Trust, pp.303-323, 2015.
DOI : 10.1007/978-3-662-46666-7_16

URL : https://hal.archives-ouvertes.fr/hal-01103545

V. Cortier, D. Galindo, S. Glondu, and M. Izabachène, Election Verifiability for Helios under Weaker Trust Assumptions, Computer Security -ESORICS 2014 -19th European Symposium on Research in Computer Security Proceedings, Part II, pp.327-344, 2014.
DOI : 10.1007/978-3-319-11212-1_19

URL : https://hal.archives-ouvertes.fr/hal-01011294

V. Cortier, D. Galindo, R. Küsters, J. Müller, and T. Truderung, SoK: Verifiability Notions for E-Voting Protocols, 2016 IEEE Symposium on Security and Privacy (SP), 2016.
DOI : 10.1109/SP.2016.52

URL : https://hal.archives-ouvertes.fr/hal-01280445

V. Cortier and B. Smyth, Attacking and Fixing Helios: An Analysis of Ballot Secrecy, CSF'11: 24th IEEE Computer Security Foundations Symposium, pp.297-311, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00732899

V. Cortier and B. Smyth, Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013.
DOI : 10.3233/JCS-2012-0458

URL : https://hal.archives-ouvertes.fr/hal-00732899

V. Cortier and C. Wiedling, A Formal Analysis of the Norwegian E-voting Protocol, POST'12: 1st International Conference on Principles of Security and Trust, pp.109-128, 2012.
DOI : 10.1007/978-3-642-28641-4_7

URL : https://hal.archives-ouvertes.fr/hal-00732907

R. Cramer, R. Gennaro, and B. Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme, Advances in Cryptology (EUROCRYPT'97), pp.103-118, 1997.

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.
DOI : 10.3233/JCS-2009-0340

D. Fiore and A. Nitulescu, On the (In)Security of SNARKs in the Presence of Oracles, TCC'2016: 14th International Conference on the Theory of Cryptography, pp.108-138
DOI : 10.1007/11523468_12

URL : https://hal.archives-ouvertes.fr/hal-01378013

T. E. Gamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Trans. Information Theory, vol.31, issue.4, pp.469-472, 1985.

M. Jakobsson, A. Juels, and R. L. Rivest, Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking, USENIX Security'02: 11th USENIX Security Symposium, pp.339-353, 2002.

A. Juels, D. Catalano, and M. Jakobsson, Coercion-Resistant Electronic Elections, Towards Trustworthy Elections, pp.37-63, 2010.

S. Khazaei, T. Moran, and D. Wikström, A Mix-Net from Any CCA2 Secure Cryptosystem, ASIACRYPT'12: 18th International Conference on the Theory and Application of Cryptology and Information Security, pp.607-625, 2012.
DOI : 10.1007/978-3-642-34961-4_37

R. Küsters and T. Truderung, Security Analysis of Re-Encryption RPC Mix Nets, 2016 IEEE European Symposium on Security and Privacy (EuroS&P), pp.227-242, 2016.
DOI : 10.1109/EuroSP.2016.27

R. Küsters, T. Truderung, and A. Vogt, Accountabiliy: Definition and Relationship to Verifiability, CCS'10: 17th ACM Conference on Computer and Communications Security, pp.526-535, 2010.

C. H. Lim and P. J. Lee, Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks, Crypto '93: Advances in Cryptology, pp.420-434, 1993.
DOI : 10.1007/3-540-48329-2_36

C. A. Neff, A verifiable secret shuffle and its application to e-voting, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, pp.116-125, 2001.
DOI : 10.1145/501983.502000

C. Park, K. Itoh, and K. Kurosawa, Efficient Anonymous Channel and All/Nothing Election Scheme, EUROCRYPT'93: Workshop on the Theory and Application of Cryptographic Techniques, pp.248-259, 1994.
DOI : 10.1007/3-540-48285-7_21

V. Shoup, A Proposal for an ISO Standard for Public Key Encryption (version 2, 2001.

V. Shoup and R. Gennaro, Securing Threshold Cryptosystems against Chosen Ciphertext Attack, Journal of Cryptology, pp.1-16, 1999.

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security Analysis of the Estonian Internet Voting System, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014.
DOI : 10.1007/978-3-642-32946-3_10

D. Wikström, A Universally Composable Mix-Net, TCC'04: 1st Theory of Cryptography Conference, pp.317-335, 2004.
DOI : 10.1007/978-3-540-24638-1_18

S. Wolchok, E. Wustrow, D. Isabel, and A. Halderman, Attacking the Washington, D.C. Internet Voting System, Financial Cryptography 2012, pp.114-128, 2012.
DOI : 10.1007/978-3-642-32946-3_10