, European Symposium on Research in Computer Security, Wroclaw, Poland, vol.8713, pp.327-344, 2014.

V. Cortier, D. Galindo, R. Küsters, J. Müller, and T. Truderung, Sok: Verifiability notions for e-voting protocols, 36th IEEE Symposium on Security and Privacy (S&P'16), pp.779-798, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01280445

V. Cortier and B. Smyth, Attacking and fixing helios: An analysis of ballot secrecy, Proceedings of the 24th IEEE Computer Security Foundations Symposium, pp.27-29, 2011.
URL : https://hal.archives-ouvertes.fr/inria-00638556

V. Cortier and B. Smyth, Attacking and fixing helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, issue.1, pp.89-148, 2013.
URL : https://hal.archives-ouvertes.fr/inria-00638556

V. Cortier and C. Wiedling, A formal analysis of the norwegian evoting protocol, Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), vol.7215, pp.109-128, 2012.
URL : https://hal.archives-ouvertes.fr/inria-00636115

S. Delaune, S. Kremer, and M. Ryan, Verifying privacy-type properties of electronic voting protocols, Journal of Computer Security, vol.17, issue.4, pp.435-487, 2009.

D. Dolev, C. Dwork, and M. Naor, Nonmalleable cryptography. SIAM review, vol.45, issue.4, pp.727-784, 2003.

D. Fiore and A. Nitulescu, On the (In)Security of SNARKs in the Presence of Oracles, TCC'2016: 14th International Conference on the Theory of Cryptography, vol.9985, pp.108-138, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01378013

E. Fujisaki and T. Okamoto, Secure integration of asymmetric and symmetric encryption schemes, J. Cryptology, vol.26, issue.1, pp.80-101, 2013.

R. Küsters, T. Truderung, and A. Vogt, Clash Attacks on the Verifiability of E-Voting Systems, 33rd IEEE Symposium on Security and Privacy (S&P 2012), pp.395-409, 2012.

A. Petcher and G. Morrisett, The foundational cryptography framework, Principles of Security and Trust-4th International Conference, POST 2015, Held as Part of the European Joint Conferences on Theory and Practice of Software, pp.53-72, 2015.

V. Shoup, A proposal for an ISO standard for public key encryption, IACR Cryptology ePrint Archive, p.112, 2001.

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security analysis of the estonian internet voting system, 21st ACM Conference on Computer and Communications Security (CCS'14), 2014.

S. Wolchok, E. Wustrow, D. Isabel, and A. Halderman, Attacking the Washington, D.C. Internet Voting System, Financial Cryptography 2012, pp.114-128, 2012.