Mobile Values, New names, and Secure Communication, 28th ACM Symposium on Principles of Programming Languages (POPL), 2001. ,
DOI : 10.1145/360204.360213
URL : https://hal.archives-ouvertes.fr/hal-01423924
Reduction of equational theories for verification of trace equivalence: re-encryption and AC, First International Conference on Principles of Security and Trust (POST'12, 2012. ,
When Are Three Voters Enough for Privacy Properties?, Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS'16), 2016. ,
DOI : 10.1007/978-3-642-36830-1_12
URL : https://hal.archives-ouvertes.fr/hal-01351398
Viganò , and Laurent Vigneron. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, 17th International Conference on Computer Aided Verification (CAV), 2005. ,
Automated Symbolic Proofs of Observational Equivalence, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, p.2015 ,
DOI : 10.1007/978-3-540-79966-5_1
URL : https://hal.archives-ouvertes.fr/hal-01337409
Star-vote: A secure, transparent, auditable, and reliable voting system, 2013 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, p.2013 ,
Adapting Helios for Provable Ballot Secrecy, 16th European Symposium on Research in Computer Security (ESORICS), 2011. ,
DOI : 10.1007/978-3-642-23822-2_19
URL : https://hal.archives-ouvertes.fr/inria-00638554
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), 2012. ,
DOI : 10.1007/978-3-642-34961-4_38
Cryptographically verified implementations for TLS, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008. ,
DOI : 10.1145/1455770.1455828
An Automatic Security Protocol Verifier based on Resolution Theorem Proving (invited tutorial), 20th International Conference on Automated Deduction (CADE), 2005. ,
Vérification Automatique de Protocoles Cryptographiques: Modèle Formel et Modèle Calculatoire Mémoire d'habilitation à diriger des recherches, 2008. ,
Automated Verification of Selected Equivalences for Security Protocols, Journal of Logical and Algebraic Methods in Programming, 2008. ,
Automated verification of equivalence properties of cryptographic protocols, 21th European Symposium on Programming, p.2012 ,
URL : https://hal.archives-ouvertes.fr/hal-00732905
Corrections to ???Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections Through Confirmation Codes??? [Dec 09 611-627, IEEE Transactions on Information Forensics and Security, vol.5, issue.1, p.194, 2010. ,
DOI : 10.1109/TIFS.2010.2040672
Trace equivalence decision, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046744
A Method for Proving Observational Equivalence, 2009 22nd IEEE Computer Security Foundations Symposium, 2009. ,
DOI : 10.1109/CSF.2009.9
URL : https://hal.archives-ouvertes.fr/inria-00426622
Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, 2013. ,
DOI : 10.1109/csf.2011.27
URL : https://hal.archives-ouvertes.fr/hal-00732899
A formal analysis of the Norwegian E-voting protocol, First International Conference on Principles of Security and Trust (POST), 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00732907
A Secure and Optimally Efficient Multi- Authority Election Scheme, International Conference on the Theory and Application of Cryptographic Techniques (EuroCrypt), 1997. ,
DOI : 10.1007/3-540-69053-0_9
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols, 20th International Conference of Computer Aided Verification (CAV), 2008. ,
DOI : 10.1007/978-3-540-70545-1_38
Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, 2009. ,
DOI : 10.3233/JCS-2009-0340
URL : http://www.lsv.ens-cachan.fr/Publis/RAPPORTS_LSV/PDF/rr-lsv-2008-01.pdf
A practical secret voting scheme for large scale elections, Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology, 1992. ,
DOI : 10.1007/3-540-57220-1_66
Analysis of an Internet Voting Protocol, Cryptology ePrint Archive Report, vol.380, 2010. ,
The norwegian internet voting protocol. Cryptology ePrint Archive, 2013. ,
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election, 5th International Conference on E-voting and Identity (VoteID'15), 2015. ,
DOI : 10.1007/978-3-319-22270-7_3
Receipt freeness of prêt à voter provably secure, IACR Cryptology ePrint Archive, p.594, 2011. ,
ProSwapper: Improved equivalence verifier for ProVerif (last seen: 08-26-16), 2010. ,
An Epistemic Approach to Coercion-Resistance for Electronic Voting Protocols, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.13