On practical aspects of coercion-resistant remote voting systems K Krips, J Willemson Electronic Voting: 4th International Joint Conference, E-Vote-ID 2019 …, 2019 | 27 | 2019 |
Planning the next steps for Estonian Internet voting S Heiberg, K Krips, J Willemson E-Vote-ID 2020, 2020 | 10 | 2020 |
Developing a Personal Voting Machine for the Estonian Internet Voting System V Farzaliyev, K Krips, J Willemson SAC '21, 2021 | 9 | 2021 |
Is your vote overheard? A new scalable side-channel attack against paper voting K Krips, J Willemson, S Värv 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 621-634, 2019 | 6 | 2019 |
Facial Recognition for Remote Electronic Voting–Missing Piece of the Puzzle or Yet Another Liability? S Heiberg, K Krips, J Willemson, P Vinkel Emerging Technologies for Authorization and Authentication: 4th …, 2022 | 5 | 2022 |
Mobile voting–still too risky? S Heiberg, K Krips, J Willemson Financial Cryptography and Data Security. FC 2021 International Workshops …, 2021 | 3 | 2021 |
Implementing an audio side channel for paper voting K Krips, J Willemson, S Värv Electronic Voting: Third International Joint Conference, E-Vote-ID 2018 …, 2018 | 3 | 2018 |
An Internet Voting Protocol with Distributed Verification Receipt Generation K Krips, I Kubjas, J Willemson Proceedings of the E-Vote-ID, 128, 2018 | 2 | 2018 |
Estimating Carbon Footprint of Paper and Internet Voting J Willemson, K Krips International Joint Conference on Electronic Voting, 140-155, 2023 | 1 | 2023 |
Trust assumptions in voting systems K Krips, N Snetkov, J Vakarjuk, J Willemson arXiv preprint arXiv:2309.10391, 2023 | 1 | 2023 |
Formal Verification of an Internet Voting Protocol K Krips Second In, 408, 2017 | | 2017 |
Creating a 3D model from a video by a single camera MTAT. 03.260 K Krips, T Petmanson | | 2011 |
Detecting constellations in night sky images Project report Advanced Algorithmics (MTAT. 03.238) K Krips, T Petmanson | | 2011 |
Security of Symmetric Encryption against Mass Surveillance K Krips | | |
Overview of EasyCrypt tool and its possible applications for ProveIt K Krips | | |
An overview of Fast Hash Table Lookup Using Extended Bloom Filter K Krips | | |
Verified Proofs of Higher-Order Masking K Krips | | |
Tools for analysing the security of symmetric primitives K Krips | | |