Machine-checked proofs of privacy for electronic voting protocols V Cortier, CC Drăgan, F Dupressoir, B Schmidt, PY Strub, B Warinschi 2017 IEEE Symposium on Security and Privacy (SP), 993-1008, 2017 | 52 | 2017 |
Machine-checked proofs for electronic voting: privacy and verifiability for Belenios V Cortier, CC Dragan, F Dupressoir, B Warinschi 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 298-312, 2018 | 36 | 2018 |
Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes M Barzu, FL Ţiplea, CC Drăgan Information Sciences 240, 161-172, 2013 | 27 | 2013 |
Distributive weighted threshold secret sharing schemes CC Drăgan, FL Ţiplea Information sciences 339, 85-97, 2016 | 22 | 2016 |
Key-policy attribute-based encryption for boolean circuits from bilinear maps FL Ţiplea, CC Drăgan Cryptography and Information Security in the Balkans: First International …, 2015 | 21 | 2015 |
On the asymptotic idealness of the Asmuth-Bloom threshold secret sharing scheme CC Drăgan, FL Tiplea Information Sciences 463, 75-85, 2018 | 20 | 2018 |
Hierarchical attribute-based signatures CC Drǎgan, D Gardham, M Manulis Cryptology and Network Security: 17th International Conference, CANS 2018 …, 2018 | 20 | 2018 |
Key-policy attribute-based encryption for general boolean circuits from secret sharing and multi-linear maps CC Drăgan, FL Ţiplea Cryptography and Information Security in the Balkans: Second International …, 2016 | 14 | 2016 |
A necessary and sufficient condition for the asymptotic idealness of the GRS threshold secret sharing scheme FL Ţiplea, CC Drăgan Information Processing Letters 114 (6), 299-303, 2014 | 14 | 2014 |
Mechanised models and proofs for distance-bounding I Boureanu, CC Drăgan, F Dupressoir, D Gérault, P Lafourcade 2021 IEEE 34th Computer Security Foundations Symposium (CSF), 1-16, 2021 | 9 | 2021 |
Machine-checked proofs of privacy against malicious boards for Selene & Co 1 CC Drăgan, F Dupressoir, E Estaji, K Gjøsteen, T Haines, PYA Ryan, ... Journal of Computer Security 31 (5), 469-499, 2023 | 7 | 2023 |
Augmenting an internet voting system with selene verifiability using permissioned distributed ledger M Sallal, S Schneider, M Casey, F Dupressoir, H Treharne, C Dragan, ... 2020 IEEE 40th International Conference on Distributed Computing Systems …, 2020 | 7 | 2020 |
TAPESTRY: a de-centralized service for trusted interaction online Y Yang, D Cooper, J Collomosse, CC Drăgan, M Manulis, J Steane, ... IEEE Transactions on Services Computing 15 (3), 1385-1398, 2020 | 7 | 2020 |
VMV: augmenting an internet voting system with selene verifiability M Sallal, S Schneider, M Casey, C Dragan, F Dupressoir, L Riley, ... arXiv e-prints, arXiv: 1912.00288, 2019 | 7 | 2019 |
Private votes on untrusted platforms: models, attacks and provable scheme S Bursuc, CC Dragan, S Kremer 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 606-620, 2019 | 7 | 2019 |
Key-policy attribute-based encryption from bilinear maps FL Ţiplea, CC Drăgan, AM Nica Innovative Security Solutions for Information Technology and Communications …, 2017 | 6 | 2017 |
Efficient key-policy attribute-based encryption for general Boolean circuits from multilinear maps CC Dragan, FL Tiplea Cryptology ePrint Archive, 2014 | 6 | 2014 |
Biometric-authenticated searchable encryption D Gardham, M Manulis, CC Drăgan Applied Cryptography and Network Security: 18th International Conference …, 2020 | 5 | 2020 |
TAPESTRY: A blockchain based service for trusted interaction online Y Yang, D Cooper, J Collomosse, CC Drăgan, M Manulis, J Steane, ... arXiv preprint arXiv:1905.06186, 2019 | 5 | 2019 |
Bootstrapping online trust: Timeline activity proofs CC Drăgan, M Manulis International Workshop on Data Privacy Management, 242-259, 2018 | 4 | 2018 |