Johannes Müller
Johannes Müller
Verified email at
Cited by
Cited by
Sok: Verifiability notions for e-voting protocols
V Cortier, D Galindo, R Küsters, J Müller, T Truderung
2016 IEEE Symposium on Security and Privacy (SP), 779-798, 2016
sElect: A lightweight verifiable remote voting system
R Küsters, J Müller, E Scapin, T Truderung
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 341-354, 2016
Ordinos: a verifiable tally-hiding electronic voting protocol
J Liedtke, R Küsters, J Müller, D Rausch, A Vogt
IEEE 5th European Symposium on Security and Privacy (EuroS&P 2020), 2020
SoK: techniques for verifiable mix nets
T Haines, J Müller
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 49-64, 2020
A verifiable and practical lattice-based decryption mix net with external auditing
X Boyen, T Haines, J Müller
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Cryptographic security analysis of e-voting systems: Achievements, misconceptions, and limitations
R Küsters, J Müller
Electronic Voting: Second International Joint Conference, E-Vote-ID 2017 …, 2017
Kryvos: Publicly Tally-Hiding Verifiable E-Voting
N Huber, R Küsters, T Krips, J Liedtke, J Müller, D Rausch, P Reisert, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
SoK: Secure e-voting with everlasting privacy
T Haines, R Mosaheb, J Müller, I Pryvalov
Proceedings on Privacy Enhancing Technologies 1, 279-293, 2023
Verifiable decryption in the head
K Gjøsteen, T Haines, J Müller, P Rønne, T Silde
Australasian Conference on Information Security and Privacy, 355-374, 2022
Epoque: practical end-to-end verifiable post-quantum-secure e-voting
X Boyen, T Haines, J Müller
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 272-291, 2021
How efficient are replay attacks against vote privacy? a formal quantitative analysis
D Mestel, J Müller, P Reisert
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 179-194, 2022
Breaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV
J Müller
Workshop on Advances in Secure Electronic Voting 2022, 2022
Post-Quantum Anonymous Veto Networks
J Ding, D Emery, J Müller, PYA Ryan, VK Wong
Cryptology ePrint Archive, 2020
CAISED: A Protocol for Cast-as-Intended Verifiability with a Second Device
J Müller, T Truderung
International Joint Conference on Electronic Voting, 123-139, 2023
Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions
T Haines, J Müller, I Querejeta-Azurmendi
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 1576-1584, 2023
How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting
T Haines, J Müller
Cryptology ePrint Archive, 2020
A novel proof of shuffle: exponentially secure cut-and-choose
T Haines, J Müller
Australasian Conference on Information Security and Privacy, 293-308, 2021
Design and cryptographic security analysis of e-voting protocols
J Müller
SoK: Post-Quantum TLS Handshake
N Alnahawi, J Müller, J Oupický, A Wiesmaier
Cryptology ePrint Archive, 2023
Optimal randomized partial checking for decryption mix nets
T Haines, J Müller
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20