, Délibération n° 2010-371 du 21 octobre 2010 portant adoption d'une recommandation relative à la sécurité des systèmes de vote électronique, 2010.

, Ordonnance de la ChF sur le vote électronique (OVotE) du 13 décembre, Chancellerie fédérale ChF. Swiss recommendation on e-voting, 2013.

M. Abadi and C. Fournet, Mobile Values, New Names, and Secure Communication, 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL'01), pp.104-115, 2001.
URL : https://hal.archives-ouvertes.fr/hal-01423924

B. Adida, Helios: Web-based Open-Audit Voting, 17th USENIX Security Symposium (Usenix'08, pp.335-348, 2008.

M. Backes, C. Hritcu, and M. Maffei, Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008.

J. Benaloh, Verifiable secret-ballot elections, 1987.

D. Bernhard, V. Cortier, D. Galindo, O. Pereira, and B. Warinschi, A comprehensive analysis of game-based ballot privacy definitions, Proceedings of the 36th IEEE Symposium on Security and Privacy (S&P'15), pp.499-516, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01206289

D. Bernhard, O. Pereira, and B. Warinschi, How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios, Advances in Cryptology-ASIACRYPT 2012, vol.7658, pp.626-643, 2012.

D. Bernhard and B. Smyth, Ballot secrecy with malicious bulletin boards, Cryptology ePrint Archive, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01102306

B. Blanchet, Modeling and Verifying Security Protocols with the Applied Pi Calculus and ProVerif, Foundations and Trends in Privacy and Security, vol.1, pp.1-135, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01423760

I. Brightwell, J. Cucurull, D. Galindo, and S. Guasch, An overview of the iVote 2015 voting system, 2015.

P. Chaidos, V. Cortier, G. Fuchsbauer, and D. Galindo, BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, 23rd ACM Conference on Computer and Communications Security (CCS'16), pp.1614-1625, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01377917

B. Chevallier-mames, P. Fouque, D. Pointcheval, J. Stern, and J. Traoré, On Some Incompatible Properties of Voting Schemes, Towards Trustworthy Elections, pp.191-199, 2010.
URL : https://hal.archives-ouvertes.fr/inria-00539539

M. R. Clarkson, S. Chong, and A. C. Myers, Civitas: Toward a Secure Voting System, IEEE Symposium on Security and Privacy (S&P'08), pp.354-368, 2008.

V. Cortier, D. Galindo, S. Glondu, and M. Izabachene, Election Verifiability for Helios under Weaker Trust Assumptions, 19th European Symposium on Research in Computer Security (ESORICS'14), vol.8713, pp.327-344, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01011294

V. Cortier, D. Galindo, R. Küsters, J. Müller, and T. Truderung, SoK: Verifiability Notions for E-Voting Protocols, 36th IEEE Symposium on Security and Privacy (S&P'16), pp.779-798, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01280445

V. Cortier, N. Grimm, J. Lallemand, and M. Maffei, A type system for privacy properties, 24th ACM Conference on Computer and Communications Security (CCS'17), pp.409-423, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01626109

V. Cortier and J. Lallemand, Voting: You Can't Have Privacy without Individual Verifiability, Research Report. CNRS, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01900086

V. Cortier and B. Smyth, Attacking and fixing Helios: An analysis of ballot secrecy, Journal of Computer Security, vol.21, pp.89-148, 2013.
URL : https://hal.archives-ouvertes.fr/inria-00638556

V. Cortier and C. Wiedling, A formal analysis of the Norwegian E-voting protocol, Proceedings of the 1st International Conference on Principles of Security and Trust (POST'12), vol.7215, pp.109-128, 2012.
URL : https://hal.archives-ouvertes.fr/inria-00636115

S. Delaune, S. Kremer, and M. D. Ryan, Coercion-Resistance and Receipt-Freeness in Electronic Voting, 19th IEEE Computer Security Foundations Workshop (CSFW'06), pp.28-39, 2006.

S. Delaune, S. Kremer, and M. D. Ryan, Verifying Privacytype Properties of Electronic Voting Protocols, Journal of Computer Security, vol.17, pp.435-487, 2009.

D. Galindo, S. Guasch, and J. Puiggali, Neuchâtel's Castas-Intended Verification Mechanism, 5th International Conference on E-Voting and Identity, pp.3-18, 2015.

R. Gonggrijp and W. Hengeveld, Studying the, 2007.

, ES3B Voting Computer: A Computer Security Perspective, USENIX Workshop on Accurate Electronic Voting Technology (EVT'07)

S. Heiberg and T. Martens, Improving the Verifiability of the Estonian Internet Voting Scheme, E-Vote-ID 2016, vol.10141, pp.92-107, 2017.

S. Kremer, M. D. Ryan, and B. Smyth, Election verifiability in electronic voting protocols, 15th European Symposium on Research in Computer Security (ESORICS'10), vol.6345, 2010.

R. Küsters, T. Truderung, and A. Vogt, Accountabiliy: Definition and Relationship to Verifiability, 17th ACM Conference on Computer and Communications Security (CCS'10, pp.526-535, 2010.

R. Küsters, T. Truderung, and A. Vogt, Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study, 32nd IEEE Symposium on Security and Privacy, pp.538-553, 2011.

R. L. Rivest and W. D. Smith, Three Voting Protocols: ThreeBallot, VAV and Twin, USENIX/ACCURATE Electronic Voting Technology, 2007.

P. Roenne, The attack has been discovered by Peter Roenne and then described in the paper

P. Ryan, Prêt à Voter with Paillier encryption, Mathematical and Computer Modelling, vol.48, issue.10, pp.1646-1662, 2008.

D. Springall, T. Finkenauer, Z. Durumeric, J. Kitcat, H. Hursti et al., Security Analysis of the Estonian Internet Voting System, 2014 ACM SIGSAC Conference on Computer and Communications Security, pp.703-715, 2014.

S. Wolchok, E. Wustrow, J. A. Halderman, H. K. Prasad, A. Kankipati et al., Security Analysis of India's Electronic Voting Machines, 17th ACM Conference on Computer and Communications Security (CCS'10), 2010.

S. Wolchok, E. Wustrow, D. Isabel, and J. A. Halderman, Internet Voting System, Financial Cryptography and Data Security (FC'12), 2012.