. Belenios-webpage,

B. Adida, Helios: Web-based open-audit voting, Proceedings of the 17th USENIX Security Symposium, pp.335-348, 2008.

J. B. Almeida, M. Barbosa, G. Barthe, F. Dupressoir, B. Grégoire et al., A fast and verified software stack for secure function evaluation, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 1989.
URL : https://hal.archives-ouvertes.fr/hal-01649104

J. H. An, Y. Dodis, and T. Rabin, On the security of joint signature and encryption, International Conference on the Theory and Applications of Cryptographic Techniques, pp.83-107, 2002.

G. Barthe, J. M. Crespo, Y. Lakhnech, and B. Schmidt, Mind the gap: Modular machine-checked proofs of one-round key exchange protocols, Advances in Cryptology-EUROCRYPT 2015-34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, vol.9057, pp.689-718, 2015.

G. Barthe, F. Dupressoir, B. Grégoire, C. Kunz, B. Schmidt et al., Easycrypt: A tutorial, Foundations of Security Analysis and Design VII, vol.8604, pp.146-166, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01114366

G. Barthe, C. Fournet, B. Grégoire, P. Strub, N. Swamy et al., Probabilistic relational verification for cryptographic implementations, The 41st Annual ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, POPL '14, pp.193-206, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00935743

M. Bellare and O. Goldreich, On defining proofs of knowledge, Annual International Cryptology Conference, pp.390-420, 1992.

M. Bellare and P. Rogaway, Random oracles are practical: A paradigm for designing efficient protocols, Proceedings of the 1st ACM conference on Computer and communications security, pp.62-73, 1993.

M. Bellare and P. Rogaway, The security of triple encryption and a framework for code-based game-playing proofs, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp.409-426, 2006.

M. Bellare and A. Sahai, Non-malleable encryption: Equivalence between two notions, and an indistinguishability-based characterization, Annual International Cryptology Conference, pp.519-536, 1999.

D. Bernhard, Zero-Knowledge Proofs in Theory and Practice, 2014.

D. Bernhard, V. Cortier, D. Galindo, O. Pereira, and B. Warinschi, Sok: A comprehensive analysis of game-based ballot privacy definitions, 2015 IEEE Symposium on Security and Privacy, vol.2015, pp.499-516, 2015.

D. Bernhard, M. Fischlin, and B. Warinschi, Adaptive proofs of knowledge in the random oracle model, IET Information Security, vol.10, issue.6, pp.319-331, 2016.

D. Bernhard, O. Pereira, and B. Warinschi, How not to prove yourself: Pitfalls of the fiat-shamir heuristic and applications to helios, International Conference on the Theory and Application of Cryptology and Information Security, pp.626-643, 2012.

D. Bernhard and B. Smyth, Ballot secrecy with malicious bulletin boards, Cryptology ePrint Archive, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01102306

B. Blanchet, An automatic security protocol verifier based on resolution theorem proving, 20th International Conference on Automated Deduction (CADE-20), 2005.

V. Cortier, C. C. Dr?-agan, F. Dupressoir, B. Schmidt, P. Strub et al., Machine-Checked Proofs of Privacy for Electronic Voting Protocols, IEEE Symposium on Security and Privacy, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01624270

V. Cortier, C. C. Dr?-agan, F. Dupressoir, and B. Warinschi, EasyCrypt proofs of privacy and verifiability for Belenios

V. Cortier, D. Galindo, S. Glondu, and M. Izabachène, Election verifiability for helios under weaker trust assumptions, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011294

, European Symposium on Research in Computer Security, Wroclaw, Poland, vol.8713, pp.327-344, 2014.

V. Cortier, D. Galindo, R. Küsters, J. Müller, and T. Truderung, Sok: Verifiability notions for e-voting protocols, 36th IEEE Symposium on Security and Privacy (S&P'16), pp.779-798, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01280445

V. Cortier and B. Smyth, Attacking and fixing helios: An analysis of ballot secrecy, Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp.27-29, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00638556

V. Cortier and B. Smyth, Attacking and fixing helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013.
URL : https://hal.archives-ouvertes.fr/inria-00638556

V. Cortier and C. Wiedling, A formal analysis of the norwegian evoting protocol, Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), vol.7215, pp.109-128, 2012.
URL : https://hal.archives-ouvertes.fr/inria-00636115

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.

D. Dolev, C. Dwork, and M. Naor, Nonmalleable cryptography. SIAM review, vol.45, issue.4, pp.727-784, 2003.

D. Fiore and A. Nitulescu, On the (In)Security of SNARKs in the Presence of Oracles, TCC'2016: 14th International Conference on the Theory of Cryptography, vol.9985, pp.108-138, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01378013

E. Fujisaki and T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, J. Cryptology, vol.26, issue.1, pp.80-101, 2013.

R. Küsters, T. Truderung, and A. Vogt, Clash Attacks on the Verifiability of E-Voting Systems, 33rd IEEE Symposium on Security and Privacy (S&P 2012), pp.395-409, 2012.

A. Petcher and G. Morrisett, The foundational cryptography framework, Principles of Security and Trust-4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, pp.53-72, 2015.

V. Shoup, A proposal for an ISO standard for public key encryption, IACR Cryptology ePrint Archive, p.112, 2001.

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security analysis of the estonian internet voting system, 21st ACM Conference on Computer and Communications Security (CCS'14), 2014.

S. Wolchok, E. Wustrow, D. Isabel, and A. Halderman, Attacking the Washington, D.C. Internet Voting System, Financial Cryptography 2012, pp.114-128, 2012.