


Остановите войну!
for scientists:
Peter Y. A. Ryan
Peter Ryan 0001
Person information

- affiliation: University of Luxembourg
Other persons with the same name
- Peter Ryan — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j27]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan:
Highly Vectorized SIKE for AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(2): 41-68 (2022) - 2021
- [j26]Ellis Fenske, Dane Brown, Jeremy Martin, Travis Mayberry, Peter Ryan, Erik C. Rye:
Three Years Later: A Study of MAC Address Randomization In Mobile Devices And When It Succeeds. Proc. Priv. Enhancing Technol. 2021(3): 164-181 (2021) - [j25]Hao Cheng, Georgios Fotiadis, Johann Großschädl, Peter Y. A. Ryan, Peter B. Rønne
:
Batching CSIDH Group Actions using AVX-512. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 618-649 (2021) - [j24]Karola Marky, Marie-Laure Zollinger, Peter B. Roenne
, Peter Y. A. Ryan, Tim Grube
, Kai Kunze:
Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes. ACM Trans. Comput. Hum. Interact. 28(5): 30:1-30:36 (2021) - [c108]Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. ACISP 2021: 330-349 - [c107]Wojciech Jamroga, Peter Y. A. Ryan, Steve Schneider, Carsten Schürmann, Philip B. Stark:
A Declaration of Software Independence. Protocols, Strands, and Logic 2021: 198-217 - [c106]Hao Cheng, Johann Großschädl, Peter B. Rønne
, Peter Y. A. Ryan:
Avrntru: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. DATE 2021: 1272-1277 - [c105]Peter Y. A. Ryan
, Peter B. Roenne
, Dimiter Ostrev
, Fatima-Ezzahra El Orche, Najmeh Soroush
, Philip B. Stark
:
Who Was that Masked Voter? The Tally Won't Tell! E-VOTE-ID 2021: 106-123 - [c104]Marie-Laure Zollinger, Ehsan Estaji, Peter Y. A. Ryan, Karola Marky:
"Just for the Sake of Transparency": Exploring Voter Mental Models of Verifiability. E-VOTE-ID 2021: 155-170 - [c103]Peter B. Rønne
, Peter Y. A. Ryan, Ben Smyth:
Cast-as-Intended: A Formal Definition and Case Studies. Financial Cryptography Workshops 2021: 251-262 - [c102]Georgios Fotiadis
, José Moreira
, Thanassis Giannetsos
, Liqun Chen
, Peter B. Rønne
, Mark Ryan, Peter Y. A. Ryan
:
Root-of-Trust Abstractions for Symbolic Analysis: Application to Attestation Protocols. STM 2021: 163-184 - [i38]Gergei Bana, Wojciech Jamroga, David Naccache, Peter Y. A. Ryan:
Convergence Voting: From Pairwise Comparisons to Consensus. CoRR abs/2102.01995 (2021) - [i37]Peter B. Rønne, Peter Y. A. Ryan, Marie-Laure Zollinger:
Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. CoRR abs/2105.14783 (2021) - [i36]Marie-Laure Zollinger, Verena Distler, Peter B. Rønne, Peter Y. A. Ryan, Carine Lallemand, Vincent Koenig:
User Experience Design for E-Voting: How mental models align with security mechanisms. CoRR abs/2105.14901 (2021) - [i35]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: authentication and key management in decentralized secure email and messaging via PAKE. CoRR abs/2107.06090 (2021) - [i34]Michel Abdalla, Manuel Barbosa, Peter B. Rønne, Peter Y. A. Ryan, Petra Sala:
Security Characterization of J-PAKE and its Variants. IACR Cryptol. ePrint Arch. 2021: 824 (2021) - [i33]Gergei Bana, Marco Biroli, Megi Dervishi, Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Hugo Waltsburger:
Time, Privacy, Robustness, Accuracy: Trade Offs for the Open Vote Network Protocol. IACR Cryptol. ePrint Arch. 2021: 1065 (2021) - [i32]Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil:
Taphonomical Security: (DNA) Information with Foreseeable Lifespan. IACR Cryptol. ePrint Arch. 2021: 1066 (2021) - [i31]Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Robert Weil, Ofer Yifrach-Stav:
Preservation of DNA Privacy During the Large Scale Detection of COVID. IACR Cryptol. ePrint Arch. 2021: 1108 (2021) - 2020
- [c101]Hao Cheng, Johann Großschädl, Peter B. Rønne
, Peter Y. A. Ryan:
Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. CARDIS 2020: 18-33 - [c100]Vincenzo Iovino, Alfredo Rial, Peter B. Rønne
, Peter Y. A. Ryan:
Universal Unconditional Verifiability in E-Voting without Trusted Parties. CSF 2020: 33-48 - [c99]Ehsan Estaji, Thomas Haines, Kristian Gjøsteen, Peter B. Rønne
, Peter Y. A. Ryan, Najmeh Soroush:
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. E-VOTE-ID 2020: 50-66 - [c98]Wojciech Jamroga, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan:
Towards Model Checking of Voting Protocols in Uppaal. E-VOTE-ID 2020: 129-146 - [c97]Marie-Laure Zollinger, Peter B. Rønne
, Peter Y. A. Ryan:
Short Paper: Mechanized Proofs of Verifiability and Privacy in a Paper-Based E-Voting Scheme. Financial Cryptography Workshops 2020: 310-318 - [c96]Itzel Vázquez Sandoval, Arash Atashpendar, Gabriele Lenzini, Peter Y. A. Ryan:
PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. ICETE (Selected Papers) 2020: 102-128 - [c95]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne
, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. Public Key Cryptography (1) 2020: 65-94 - [c94]Hao Cheng, Johann Großschädl, Jiaqi Tian, Peter B. Rønne
, Peter Y. A. Ryan:
High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. SAC 2020: 698-719 - [i30]Marcel Hollenstein, David Naccache, Peter B. Rønne, Peter Y. A. Ryan, Robert Weil, Ofer Yifrach-Stav:
Preservation of DNA Privacy During the Large Scale Detection of COVID-19. CoRR abs/2007.09085 (2020) - [i29]Wojciech Jamroga, Yan Kim, Damian Kurpiewski, Peter Y. A. Ryan:
Model Checkers Are Cool: How to Model Check Voting Protocols in Uppaal. CoRR abs/2007.12412 (2020) - [i28]Wojciech Jamroga, David Mestel, Peter B. Rønne, Peter Y. A. Ryan, Marjan Skrobot:
A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. CoRR abs/2011.07887 (2020) - [i27]Najmeh Soroush, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
Verifiable Inner Product Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 122 (2020) - [i26]Jintai Ding, Doug Emery, Johannes Müller, Peter Y. A. Ryan, Vonn Kee Wong:
Post-Quantum Anonymous Veto Networks. IACR Cryptol. ePrint Arch. 2020: 1023 (2020)
2010 – 2019
- 2019
- [c93]Verena Distler
, Marie-Laure Zollinger, Carine Lallemand
, Peter B. Rønne
, Peter Y. A. Ryan
, Vincent Koenig:
Security - Visible, Yet Unseen? CHI 2019: 605 - [c92]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan:
NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. ETAA@ESORICS 2019: 69-85 - [c91]Karola Marky
, Marie-Laure Zollinger, Markus Funk
, Peter Y. A. Ryan, Max Mühlhäuser
:
How to Assess the Usability Metrics of E-Voting Schemes. Financial Cryptography Workshops 2019: 257-271 - [c90]Jun Wang, Qiang Tang, Afonso Arriaga
, Peter Y. A. Ryan:
Novel Collaborative Filtering Recommender Friendly to Privacy Protection. IJCAI 2019: 4809-4815 - [c89]José Becerra, Peter Y. A. Ryan
, Petra Sala, Marjan Skrobot
:
An Offline Dictionary Attack Against zkPAKE Protocol. SEC 2019: 81-90 - [c88]Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne
, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. SECITC 2019: 1-20 - [c87]Wojciech Jamroga, Peter B. Rønne
, Peter Y. A. Ryan, Philip B. Stark:
Risk-Limiting Tallies. E-VOTE-ID 2019: 183-199 - [c86]Hao Cheng, Daniel Dinu, Johann Großschädl, Peter B. Rønne
, Peter Y. A. Ryan:
A Lightweight Implementation of NTRU Prime for the Post-quantum Internet of Things. WISTP 2019: 103-119 - [e16]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11735, Springer 2019, ISBN 978-3-030-29958-3 [contents] - [e15]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11736, Springer 2019, ISBN 978-3-030-29961-3 [contents] - [i25]Peter B. Rønne, Arash Atashpendar, Kristian Gjøsteen, Peter Y. A. Ryan:
Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. CoRR abs/1901.02560 (2019) - [i24]Brian Thompson, Dave Cedel, Jeremy Martin, Peter Y. A. Ryan, Sarah Kern:
Fusion of Mobile Device Signal Data Attributes Enables Multi-Protocol Entity Resolution and Enhanced Large-Scale Tracking. CoRR abs/1906.02686 (2019) - [i23]Wojciech Jamroga, Peter B. Rønne, Peter Y. A. Ryan, Philip B. Stark:
Risk-Limiting Tallies. CoRR abs/1908.04947 (2019) - [i22]Geoffroy Couteau, Bill Roscoe, Peter Y. A. Ryan:
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. IACR Cryptol. ePrint Arch. 2019: 1281 (2019) - [i21]Marc Beunardeau, Fatima-Ezzahra El Orche, Diana Maimut, David Naccache, Peter B. Rønne, Peter Y. A. Ryan:
Authenticated Key Distribution: When the Coupon Collector is Your Enemy. IACR Cryptol. ePrint Arch. 2019: 1499 (2019) - 2018
- [c85]Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning. CCS 2018: 2306-2308 - [c84]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan
:
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. CECC 2018: 7:1-7:6 - [c83]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
:
No Random, No Ransom: A Key to Stop Cryptographic Ransomware. DIMVA 2018: 234-255 - [c82]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan, Itzel Vázquez Sandoval:
A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. ICISSP 2018: 83-95 - [c81]Ziya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan
, Itzel Vázquez Sandoval:
A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. ICISSP (Revised Selected Papers) 2018: 125-151 - [c80]Arash Atashpendar, G. Vamsi Policharla, Peter B. Rønne
, Peter Y. A. Ryan
:
Revisiting Deniability in Quantum Key Exchange - via Covert Communication and Entanglement Distillation. NordSec 2018: 104-120 - [c79]Ziya Alper Genç
, Gabriele Lenzini
, Peter Y. A. Ryan
:
Next Generation Cryptographic Ransomware. NordSec 2018: 385-401 - [c78]José Becerra, Peter B. Rønne
, Peter Y. A. Ryan
, Petra Sala
:
HoneyPAKEs. Security Protocols Workshop 2018: 63-77 - [c77]Peter Y. A. Ryan
:
HoneyPAKEs (Transcript of Discussion). Security Protocols Workshop 2018: 78-83 - [c76]José Becerra, Peter Y. A. Ryan
, Petra Sala, Marjan Skrobot
:
An Offline Dictionary Attack against zkPAKE Protocol. WISEC 2018: 291-292 - [i20]Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. CoRR abs/1802.00703 (2018) - [i19]Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan:
CryptoRec: Secure Recommendations as a Service. CoRR abs/1802.02432 (2018) - [i18]Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan:
A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. CoRR abs/1807.11609 (2018) - [i17]Arash Atashpendar, G. Vamsi Policharla, Peter B. Rønne, Peter Y. A. Ryan:
Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. CoRR abs/1812.02245 (2018) - 2017
- [j23]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan
:
Trustworthy exams without trusted parties. Comput. Secur. 67: 291-307 (2017) - [j22]Josh Benaloh, Peter Y. A. Ryan
, Steve A. Schneider, Vanessa Teague:
A Vote of Confidence? IEEE Secur. Priv. 15(3): 12-13 (2017) - [c75]Peter Y. A. Ryan
:
A Brief History of Security Protocols. Concurrency, Security, and Puzzles 2017: 223-245 - [c74]Ziya Alper Genç, Gabriele Lenzini
, Peter Y. A. Ryan:
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. CECC 2017: 89-102 - [c73]Vincenzo Iovino
, Alfredo Rial, Peter B. Rønne
, Peter Y. A. Ryan
:
Using Selene to Verify Your Vote in JCJ. Financial Cryptography Workshops 2017: 385-403 - [c72]Peter Y. A. Ryan
:
Securing the Foundations of Democracy. SECITC 2017: 52-66 - [c71]A. W. Roscoe, Peter Y. A. Ryan
:
Auditable PAKEs: Approaching Fair Exchange Without a TTP. Security Protocols Workshop 2017: 278-297 - [c70]Peter Y. A. Ryan
:
Auditable PAKEs: Approaching Fair Exchange Without a TTP (Transcript of Discussion). Security Protocols Workshop 2017: 298-305 - [c69]Matthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan
, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. E-VOTE-ID 2017: 84-109 - [c68]Gabriele Lenzini
, Samir Ouchani, Peter B. Rønne
, Peter Y. A. Ryan
, Yong Geng, Jan Lagerwall, JungHyun Noh:
Security in the shell: An optical physical unclonable function made of shells of cholesteric liquid crystals. WIFS 2017: 1-6 - [e14]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [e13]Robert Krimmer, Melanie Volkamer, Jordi Barrat, Josh Benaloh, Nicole J. Goodman, Peter Y. A. Ryan, Vanessa Teague:
Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings. Lecture Notes in Computer Science 10141, Springer 2017, ISBN 978-3-319-52239-5 [contents] - [i16]Josh Benaloh, Matthew Bernhard, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach:
Public Evidence from Secret Ballots. CoRR abs/1707.08619 (2017) - 2016
- [c67]Peter Y. A. Ryan
:
Crypto Santa. The New Codebreakers 2016: 543-549 - [c66]Masoud Tabatabaei, Wojciech Jamroga
, Peter Y. A. Ryan
:
Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. PrAISe@ECAI 2016: 1:1-1:8 - [c65]Peter Y. A. Ryan
, Peter B. Rønne
, Vincenzo Iovino
:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Financial Cryptography Workshops 2016: 176-192 - [e12]Peter Y. A. Ryan
, David Naccache, Jean-Jacques Quisquater:
The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Lecture Notes in Computer Science 9100, Springer 2016, ISBN 978-3-662-49300-7 [contents] - [e11]Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7 [contents] - [i15]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. CoRR abs/1610.06343 (2016) - [i14]Gina Gallegos-García, Vincenzo Iovino, Alfredo Rial, Peter B. Rønne, Peter Y. A. Ryan:
(Universal) Unconditional Verifiability in E-Voting without Trusted Parties. IACR Cryptol. ePrint Arch. 2016: 975 (2016) - 2015
- [j21]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Manifestos 5(1): 25-37 (2015) - [j20]Peter Y. A. Ryan
, Steve A. Schneider
, Vanessa Teague:
End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Secur. Priv. 13(3): 59-62 (2015) - [j19]Chris Culnane
, Peter Y. A. Ryan
, Steve A. Schneider
, Vanessa Teague:
vVote: A Verifiable Voting System. ACM Trans. Inf. Syst. Secur. 18(1): 3:1-3:30 (2015) - [c64]Giampaolo Bella
, Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
A Secure Exam Protocol Without Trusted Parties. SEC 2015: 495-509 - [c63]Arash Atashpendar, A. W. Roscoe, Peter Y. A. Ryan
:
Information Leakage Due to Revealing Randomly Selected Bits. Security Protocols Workshop 2015: 325-341 - [e10]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9326, Springer 2015, ISBN 978-3-319-24173-9 [contents] - [e9]Günther Pernul, Peter Y. A. Ryan
, Edgar R. Weippl:
Computer Security - ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9327, Springer 2015, ISBN 978-3-319-24176-0 [contents] - [i13]Josh Benaloh, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora:
End-to-end verifiability. CoRR abs/1504.03778 (2015) - [i12]Peter Y. A. Ryan, Peter B. Rønne, Vincenzo Iovino:
Selene: Voting with Transparent Verifiability and Coercion-Mitigation. IACR Cryptol. ePrint Arch. 2015: 1105 (2015) - 2014
- [c62]Afonso Arriaga
, Qiang Tang, Peter Y. A. Ryan
:
Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. AFRICACRYPT 2014: 31-50 - [c61]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini, Peter Y. A. Ryan
:
Formal Security Analysis of Traditional and Electronic Exams. ICETE (Selected Papers) 2014: 294-318 - [c60]Jannik Dreier, Rosario Giustolisi, Ali Kassem, Pascal Lafourcade
, Gabriele Lenzini, Peter Y. A. Ryan:
Formal Analysis of Electronic Exams. SECRYPT 2014: 101-112 - [c59]Rosario Giustolisi, Gabriele Lenzini
, Peter Y. A. Ryan
:
Remark!: A Secure Protocol for Remote Exams. Security Protocols Workshop 2014: 38-48 - [c58]Chris Culnane, James Heather, Rui Joaquim, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
Faster Print on Demand for Prêt à Voter. EVT/WOTE 2014 - [i11]Chris Culnane, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague:
vVote: a Verifiable Voting System (DRAFT). CoRR abs/1404.6822 (2014) - [i10]Bart Preneel, Phillip Rogaway, Mark Dermot Ryan, Peter Y. A. Ryan:
Privacy and Security in an Age of Surveillance (Dagstuhl Perspectives Workshop 14401). Dagstuhl Reports 4(9): 106-123 (2014) - [i9]Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Y. A. Ryan, Konstantinos Kalpakis:
DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptol. ePrint Arch. 2014: 670 (2014) - 2013
- [j18]Marc Pouly
, Jürg Kohlas, Peter Y. A. Ryan
:
Generalized information theory for hints. Int. J. Approx. Reason. 54(1): 228-251 (2013) - [c57]Gurchetan S. Grewal, Mark Dermot Ryan, Sergiu Bursuc, Peter Y. A. Ryan
:
Caveat Coercitor: Coercion-Evidence in Electronic Voting. IEEE Symposium on Security and Privacy 2013: 367-381 - [c56]Josh Benaloh, Peter Y. A. Ryan
, Vanessa Teague:
Verifiable Postal Voting. Security Protocols Workshop 2013: 54-65 - [c55]Peter Y. A. Ryan
, Bruce Christianson
:
Enhancements to Prepare-and-Measure Based QKD Protocols. Security Protocols Workshop 2013: 123-133 - [c54]Peter Y. A. Ryan:
Enhancements to Prepare-and-Measure-Based QKD Protocols (Transcript of Discussion). Security Protocols Workshop 2013: 134-142 - [c53]Dalia Khader, Qiang Tang, Peter Y. A. Ryan:
Proving Prêt à Voter Receipt Free Using Computational Security Models. EVT/WOTE 2013 - [c52]Morgan Llewellyn, Steve A. Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y. A. Ryan, Sriramkrishnan Srinivasan:
Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. EVT/WOTE 2013 - [c51]Denise Demirel, Maria Henning, Jeroen van de Graaf, Peter Y. A. Ryan
, Johannes Buchmann:
Prêt à Voter Providing Everlasting Privacy. VoteID 2013: 156-175 - 2012
- [c50]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan, Vanessa Teague, Roland Wen, Zhe Xia:
A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. Electronic Voting 2012: 81-94 - [c49]Dalia Khader, Ben Smyth, Peter Y. A. Ryan, Feng Hao:
A Fair and Robust Voting System by Broadcast. Electronic Voting 2012: 285-299 - [c48]Lizzie Coles-Kemp, Peter Y. A. Ryan
:
Foreword from the Programme Chairs - STAST 2012. STAST 2012 - [c47]Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. EVT/WOTE 2012 - 2011
- [c46]Simon Kramer
, Peter Y. A. Ryan
:
A modular multi-modal specification of real-timed, end-to-end voter-verifiable voting systems. REVOTE 2011: 9-21 - [c45]Feng Hao
, Peter Y. A. Ryan
:
How to Sync with Alice. Security Protocols Workshop 2011: 170-178 - [c44]Peter Y. A. Ryan:
Prêt à Voter with Confirmation Codes. EVT/WOTE 2011 - [c43]Denise Demirel, Maria Henning, Peter Y. A. Ryan
, Steve A. Schneider
, Melanie Volkamer:
Feasibility Analysis of Prêt à Voter for German Federal Elections. VoteID 2011: 158-173 - [i8]R. Michael Alvarez, Josh Benaloh, Alon Rosen, Peter Y. A. Ryan:
Verifiable Elections and the Public (Dagstuhl Seminar 11281). Dagstuhl Reports 1(7): 36-52 (2011) - [i7]Dalia Khader, Peter Y. A. Ryan:
Receipt Freeness of Prêt à Voter Provably Secure. IACR Cryptol. ePrint Arch. 2011: 594 (2011) - 2010
- [j17]Feng Hao
, Peter Y. A. Ryan
, Piotr Zielinski
:
Anonymous voting by two-round public discussion. IET Inf. Secur. 4(2): 62-67 (2010) - [j16]Feng Hao
, Peter Y. A. Ryan
:
J-PAKE: Authenticated Key Exchange without PKI. Trans. Comput. Sci. 11: 192-206 (2010) - [j15]