Follow
Johannes Müller
Johannes Müller
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Sok: Verifiability notions for e-voting protocols
V Cortier, D Galindo, R Küsters, J Müller, T Truderung
2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016
1672016
sElect: A lightweight verifiable remote voting system
R Küsters, J Müller, E Scapin, T Truderung
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 341-354, 2016
682016
Ordinos: a verifiable tally-hiding electronic voting protocol
J Liedtke, R Küsters, J Müller, D Rausch, A Vogt
IEEE 5th European Symposium on Security and Privacy (EuroS&P 2020), 2020
59*2020
SoK: techniques for verifiable mix nets
T Haines, J Müller
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 49-64, 2020
342020
Kryvos: Publicly Tally-Hiding Verifiable E-Voting
N Huber, R Küsters, T Krips, J Liedtke, J Müller, D Rausch, P Reisert, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
292022
A verifiable and practical lattice-based decryption mix net with external auditing
X Boyen, T Haines, J Müller
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
282020
Cryptographic security analysis of e-voting systems: Achievements, misconceptions, and limitations
R Küsters, J Müller
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
262017
SoK: Secure e-voting with everlasting privacy
T Haines, R Mosaheb, J Müller, I Pryvalov
Proceedings on Privacy Enhancing Technologies 1, 279-293, 2023
192023
Verifiable decryption in the head
K Gjøsteen, T Haines, J Müller, P Rønne, T Silde
Australasian Conference on Information Security and Privacy, 355-374, 2022
132022
Epoque: practical end-to-end verifiable post-quantum-secure e-voting
X Boyen, T Haines, J Müller
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 272-291, 2021
132021
CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device
J Müller, T Truderung
International Joint Conference on Electronic Voting, 123-139, 2023
12*2023
Breaking and fixing vote privacy of the estonian e-voting protocol ivxv
J Mueller
International Conference on Financial Cryptography and Data Security, 325-334, 2022
122022
How efficient are replay attacks against vote privacy? a formal quantitative analysis
D Mestel, J Müller, P Reisert
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 179-194, 2022
102022
A Comprehensive Survey on Post-Quantum TLS
N Alnahawi, J Müller, J Oupický, A Wiesmaier
IACR Communications in Cryptology 1 (2), 2024
8*2024
Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions
T Haines, J Müller, I Querejeta-Azurmendi
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 1576-1584, 2023
82023
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting
T Haines, J Müller
Cryptology ePrint Archive, 2020
52020
Post-Quantum Anonymous Veto Networks
J Ding, D Emery, J Müller, PYA Ryan, VK Wong
Cryptology ePrint Archive, 2020
52020
A novel proof of shuffle: exponentially secure cut-and-choose
T Haines, J Müller
Australasian Conference on Information Security and Privacy, 293-308, 2021
42021
Design and cryptographic security analysis of e-voting protocols
J Müller
Dissertation, Stuttgart, Universität Stuttgart, 2019, 2019
32019
DeVoS: Deniable Yet Verifiable Vote Updating
J Müller, B Pejó, I Pryvalov
Proceedings on Privacy Enhancing Technologies, 2024
12024
The system can't perform the operation now. Try again later.
Articles 1–20