, Délibération n° 2010-371 du 21 octobre 2010 portant adoption d'une recommandation relative à la sécurité des systèmes de vote électronique, 2010.
, Ordonnance de la ChF sur le vote électronique (OVotE) du 13 décembre, Chancellerie fédérale ChF. Swiss recommendation on e-voting, 2013.
Mobile Values, New Names, and Secure Communication, 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001. ,
URL : https://hal.archives-ouvertes.fr/hal-01423924
Helios: Web-based Open-Audit Voting, 17th USENIX Security Symposium (Usenix'08, pp.335-348, 2008. ,
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
Verifiable secret-ballot elections, 1987. ,
A comprehensive analysis of game-based ballot privacy definitions, Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P'15), pp.499-516, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01206289
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, Advances in Cryptology-ASIACRYPT 2012, vol.7658, pp.626-643, 2012. ,
Ballot secrecy with malicious bulletin boards, Cryptology ePrint Archive, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01102306
Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, Foundations and Trends in Privacy and Security, vol.1, pp.1-135, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01423760
An overview of the iVote 2015 voting system, 2015. ,
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, 23rd ACM Conference on Computer and Communications Security (CCS'16), pp.1614-1625, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01377917
On Some Incompatible Properties of Voting Schemes, Towards Trustworthy Elections, pp.191-199, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00539539
Civitas: Toward a Secure Voting System, IEEE Symposium on Security and Privacy (S&P'08), pp.354-368, 2008. ,
Election Verifiability for Helios under Weaker Trust Assumptions, 19th European Symposium on Research in Computer Security (ESORICS'14), vol.8713, pp.327-344, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01011294
SoK: Verifiability Notions for E-Voting Protocols, 36th IEEE Symposium on Security and Privacy (S&P'16), pp.779-798, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01280445
A type system for privacy properties, 24th ACM Conference on Computer and Communications Security (CCS'17), pp.409-423, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01626109
Voting: You Can't Have Privacy without Individual Verifiability, Research Report. CNRS, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01900086
Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, pp.89-148, 2013. ,
URL : https://hal.archives-ouvertes.fr/inria-00638556
A formal analysis of the Norwegian E-voting protocol, Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), vol.7215, pp.109-128, 2012. ,
URL : https://hal.archives-ouvertes.fr/inria-00636115
Coercion-Resistance and Receipt-Freeness in Electronic Voting, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.28-39, 2006. ,
Verifying Privacytype Properties of Electronic Voting Protocols, Journal of Computer Security, vol.17, pp.435-487, 2009. ,
Neuchâtel's Castas-Intended Verification Mechanism, 5th International Conference on E-Voting and Identity, pp.3-18, 2015. ,
Studying the, 2007. ,
, ES3B Voting Computer: A Computer Security Perspective, USENIX Workshop on Accurate Electronic Voting Technology (EVT'07)
Improving the Verifiability of the Estonian Internet Voting Scheme, E-Vote-ID 2016, vol.10141, pp.92-107, 2017. ,
Election verifiability in electronic voting protocols, 15th European Symposium on Research in Computer Security (ESORICS'10), vol.6345, 2010. ,
Accountabiliy: Definition and Relationship to Verifiability, 17th ACM Conference on Computer and Communications Security (CCS'10, pp.526-535, 2010. ,
Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, 32nd IEEE Symposium on Security and Privacy, pp.538-553, 2011. ,
Three Voting Protocols: ThreeBallot, VAV and Twin, USENIX/ACCURATE Electronic Voting Technology, 2007. ,
The attack has been discovered by Peter Roenne and then described in the paper ,
Prêt à Voter with Paillier encryption, Mathematical and Computer Modelling, vol.48, issue.10, pp.1646-1662, 2008. ,
Security Analysis of the Estonian Internet Voting System, 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.703-715, 2014. ,
Security Analysis of India's Electronic Voting Machines, 17th ACM Conference on Computer and Communications Security (CCS'10), 2010. ,
Internet Voting System, Financial Cryptography and Data Security (FC'12), 2012. ,