SoK: A comprehensive analysis of game-based ballot privacy definitions D Bernhard, V Cortier, D Galindo, O Pereira, B Warinschi 2015 IEEE Symposium on Security and Privacy, 499-516, 2015 | 170 | 2015 |
Election verifiability for helios under weaker trust assumptions V Cortier, D Galindo, S Glondu, M Izabachene Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 160 | 2014 |
Sok: Verifiability notions for e-voting protocols V Cortier, D Galindo, R Küsters, J Müller, T Truderung 2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016 | 159 | 2016 |
On the generic construction of identity-based signatures with additional properties D Galindo, J Herranz, E Kiltz Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 153 | 2006 |
A schnorr-like lightweight identity-based signature scheme D Galindo, F Garcia Progress in Cryptology–AFRICACRYPT 2009, 135-148, 2009 | 142 | 2009 |
BeleniosRF: A non-interactive receipt-free electronic voting scheme P Chaidos, V Cortier, G Fuchsbauer, D Galindo Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 136* | 2016 |
Boneh-Franklin identity based encryption revisited D Galindo Automata, Languages and Programming: 32nd International Colloquium, ICALP …, 2005 | 114 | 2005 |
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles E Kiltz, D Galindo Australasian conference on information security and privacy, 336-347, 2006 | 103 | 2006 |
Improved certificate-based encryption in the standard model D Galindo, P Morillo, C Ràfols Journal of Systems and Software 81 (7), 1218-1226, 2008 | 74 | 2008 |
Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes D Galindo, P Morillo, C Ràfols Public Key Infrastructure: Third European PKI Workshop: Theory and Practice …, 2006 | 69 | 2006 |
2015 Neuchâtel’s cast-as-intended verification mechanism D Galindo, S Guasch, J Puiggali E-Voting and Identity: 5th International Conference, VoteID 2015, Bern …, 2015 | 68 | 2015 |
Fully distributed verifiable random functions and their application to decentralised random beacons D Galindo, J Liu, M Ordean, JM Wong 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 88-102, 2021 | 54 | 2021 |
Distributed elgamal á la pedersen: application to helios V Cortier, D Galindo, S Glondu, M Izabachene Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013 | 54 | 2013 |
Extended security arguments for signature schemes Ö Dagdelen, D Galindo, P Véron, SM El Yousfi Alaoui, PL Cayrel Designs, Codes and Cryptography 78 (2), 441-461, 2016 | 51* | 2016 |
A practical leakage-resilient signature scheme in the generic group model D Galindo, S Vivek International Conference on Selected Areas in Cryptography, 50-65, 2012 | 50 | 2012 |
A killer application for pairings: Authenticated key establishment in underwater wireless sensor networks D Galindo, R Roman, J Lopez Cryptology and Network Security: 7th International Conference, CANS 2008 …, 2008 | 47 | 2008 |
A formal analysis of the neuchâtel e-voting protocol V Cortier, D Galindo, M Turuani 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 430-442, 2018 | 43 | 2018 |
Identity-based encryption with master key-dependent message security and leakage-resilience D Galindo, J Herranz, J Villar European Symposium on Research in Computer Security, 627-642, 2012 | 43 | 2012 |
Direct chosen-ciphertext secure identity-based key encapsulation without random oracles E Kiltz, D Galindo Theoretical Computer Science 410 (47-49), 5093-5111, 2009 | 37 | 2009 |
An overview of the iVote 2015 voting system I Brightwell, J Cucurull, D Galindo, S Guasch New South Wales Electoral Commission, Australia, Scytl Secure Electronic …, 2015 | 36 | 2015 |