Page 364 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 364

M. Kutyłowski and F. Zagórski
                          356
                           9. Gogolewski, M., Klonowski, M., Kutyłowski, M., Kubiak, P., Lauks, A., Zagórski, F.: Klep-
                             tographic attacks on E-voting schemes. In: Müller, G. (ed.) ETRICS 2006. LNCS, vol. 3995,
                             pp. 494–508. Springer, Heidelberg (2006)
                          10. Henry, K., Stinson, D.R., Sui, J.: The effectiveness of receipt-based attacks on threeballot.
                             Cryptology ePrint Archive, Report 2007/287 (2007), http://eprint.iacr.org/
                          11. Jakobsson, M., Juels, A., Rivest, R.L.: Making mix nets robust for electronic voting by ran-
                             domized partial checking. In: USENIX Security Symposium, pp. 339–353 (2002)
                          12. Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: WPES
                             2005, pp. 61–70 (2005)
                          13. Karlof, C., Sastry, N., Wagner, D.: Cryptographic voting protocols: A systems perspective.
                             In: USENIX Security Symposium, pp. 33–50 (2005)
                          14. Moran, T., Naor, M.: Receipt-free universally-verifiable voting with everlasting privacy. In:
                             Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 373–392. Springer, Heidelberg (2006)
                          15. Popoveniuc, S., Lundin, D.: A simple technique for safely using punchscan and prêt à voter
                             in mail-in elections. In: Alkassar, A., Volkamer, M. (eds.) VOTE-ID 2007. LNCS, vol. 4896,
                             pp. 150–155. Springer, Heidelberg (2007)
                          16. Rivest, R.L., Smith, W.D.: Three voting protocols: Threeballot, vav, and twin. In: EVT 2007:
                             Proceedings of the USENIX/Accurate Electronic Voting Technology on USENIX/Accurate
                             Electronic Voting Technology Workshop, Berkeley, CA, USA, p. 16. USENIX Association
                             (2007)
                          17. Strauss, C.: A critical review of the triple ballot voting system. part 2: Cracking the triple
                             ballot encryption (2006),
                             http://www.cs.princeton.edu/ appel/voting/Strauss-
                             ThreeBallotCritique2v1.5.pdf
                          18. Strauss, C.: The trouble with triples: Acritical review of the triple ballot (3ballot) scheme,
                             part 1 (2006),
                             http://www.cs.princeton.edu/ appel/voting/Strauss-
                             TroubleWithTriples.pdf
                          19. van de Graaf, J.: Merging pret-a-voter and punchscan. Cryptology ePrint Archive, Report
                             2007/269 (2007), http://eprint.iacr.org/
   359   360   361   362   363   364   365   366   367   368   369