Sok: Verifiability notions for e-voting protocols V Cortier, D Galindo, R Küsters, J Müller, T Truderung 2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016 | 165 | 2016 |
sElect: A lightweight verifiable remote voting system R Küsters, J Müller, E Scapin, T Truderung 2016 IEEE 29th Computer Security Foundations Symposium (CSF), 341-354, 2016 | 65 | 2016 |
Ordinos: a verifiable tally-hiding electronic voting protocol J Liedtke, R Küsters, J Müller, D Rausch, A Vogt IEEE 5th European Symposium on Security and Privacy (EuroS&P 2020), 2020 | 58* | 2020 |
SoK: techniques for verifiable mix nets T Haines, J Müller 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 49-64, 2020 | 33 | 2020 |
A verifiable and practical lattice-based decryption mix net with external auditing X Boyen, T Haines, J Müller Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 28 | 2020 |
Kryvos: Publicly Tally-Hiding Verifiable E-Voting N Huber, R Küsters, T Krips, J Liedtke, J Müller, D Rausch, P Reisert, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 27 | 2022 |
Cryptographic security analysis of e-voting systems: Achievements, misconceptions, and limitations R Küsters, J Müller Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017 | 25 | 2017 |
SoK: Secure e-voting with everlasting privacy T Haines, R Mosaheb, J Müller, I Pryvalov Proceedings on Privacy Enhancing Technologies 1, 279-293, 2023 | 17 | 2023 |
Epoque: practical end-to-end verifiable post-quantum-secure e-voting X Boyen, T Haines, J Müller 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 272-291, 2021 | 12 | 2021 |
CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device J Müller, T Truderung International Joint Conference on Electronic Voting, 123-139, 2023 | 11* | 2023 |
Verifiable decryption in the head K Gjøsteen, T Haines, J Müller, P Rønne, T Silde Australasian Conference on Information Security and Privacy, 355-374, 2022 | 11 | 2022 |
How efficient are replay attacks against vote privacy? a formal quantitative analysis D Mestel, J Müller, P Reisert 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 179-194, 2022 | 10 | 2022 |
Breaking and fixing vote privacy of the estonian e-voting protocol ivxv J Mueller International Conference on Financial Cryptography and Data Security, 325-334, 2022 | 9 | 2022 |
Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions T Haines, J Müller, I Querejeta-Azurmendi Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 1576-1584, 2023 | 8 | 2023 |
A Comprehensive Survey on Post-Quantum TLS N Alnahawi, J Müller, J Oupický, A Wiesmaier IACR Communications in Cryptology 1 (2), 2024 | 5* | 2024 |
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting T Haines, J Müller Cryptology ePrint Archive, 2020 | 5 | 2020 |
Post-Quantum Anonymous Veto Networks J Ding, D Emery, J Müller, PYA Ryan, VK Wong Cryptology ePrint Archive, 2020 | 5 | 2020 |
A novel proof of shuffle: exponentially secure cut-and-choose T Haines, J Müller Australasian Conference on Information Security and Privacy, 293-308, 2021 | 3 | 2021 |
Design and cryptographic security analysis of e-voting protocols J Müller Dissertation, Stuttgart, Universität Stuttgart, 2019, 2019 | 3 | 2019 |
DeVoS: Deniable Yet Verifiable Vote Updating J Müller, B Pejó, I Pryvalov Proceedings on Privacy Enhancing Technologies, 2024 | 1 | 2024 |