Profil

RYAN Peter Y A

University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)

Main Referenced Co-authors
ROENNE, Peter  (30)
LENZINI, Gabriele  (16)
Schneider, Steve (10)
CHENG, Hao  (8)
GROSZSCHÄDL, Johann  (8)
Main Referenced Keywords
Post-Quantum Cryptography (5); Privacy (4); cryptography (3); e-voting (3); Efficient implementation (3);
Main Referenced Unit & Research Centers
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > Applied Security and Information Assurance Group (APSIA) (20)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > APSIA - Applied Security and Information Assurance (4)
Interdisciplinary Centre for Security, Reliability and Trust (SnT) > CryptoLUX – Cryptography (1)
SnT (1)
ULHPC - University of Luxembourg: High Performance Computing (1)
Main Referenced Disciplines
Computer science (89)
Mathematics (3)
Electrical & electronics engineering (1)
Materials science & engineering (1)
Life sciences: Multidisciplinary, general & others (1)

Publications (total 92)

The most downloaded
1394 downloads
Ryan, P., Demirel, D., Henning, M., van de Graaf, J., & Buchmann, J. (2013). Prêt à Voter providing everlasting privacy. Lecture Notes in Computer Science, 165-220. doi:10.1007/978-3-642-39185-9_10 https://hdl.handle.net/10993/25426

The most cited

97 citations (WOS)

Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382 https://hdl.handle.net/10993/36053

CHENG, H., FOTIADIS, G., GROSZSCHÄDL, J., & RYAN, P. Y. A. (2023). IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things. In S. Bouzefrane, S. Banerjee, F. Mourlin, S. Boumerdassi, ... E. Renault (Eds.), Mobile, Secure, and Programmable Networking: 9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (pp. 1-16). Cham, Switzerland: Springer Verlag. doi:10.1007/978-3-031-52426-4_1
Peer reviewed

Damodaran, A. S. S., Fotiadis, G., & Ryan, P. Y. A. (30 June 2023). Preparing for a Quantum-Resistant Era [Poster presentation]. ICT Spring 2023, Luxembourg City, Luxembourg.

Zollinger, M.-L., Ryan, P. Y. A., Roenne, P., Iovino, V., Rial, A., & Damodaran, A. S. S. (11 May 2023). Selene: A Usable Voting System with Transparent Verifiability and Coercion Mitigation [Poster presentation]. SnT Partnership Day 2023, Luxembourg City, Luxembourg.

Cheng, H., Fotiadis, G., Groszschädl, J., & Ryan, P. Y. A. (February 2022). Highly Vectorized SIKE for AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022 (2), 41-68. doi:10.46586/tches.v2022.i2.41-68
Peer reviewed

Zollinger, M.-L., Estaji, E., Ryan, P. Y. A., & Marky, K. (2021). "Just for the sake of transparency": Exploring Voter Mental Models Of Verifiability. In Electronic Voting, Sixth International Joint Conference, E-Vote-ID 2021, Bregenz, Austria, October 5-8.
Peer reviewed

Marky, K., Zollinger, M.-L., Roenne, P., Ryan, P. Y. A., Grube, T., & Kunze, K. (October 2021). Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes. ACM Transactions on Computer-Human Interaction, 28 (5), 1-36. doi:10.1145/3459604
Peer Reviewed verified by ORBi

Vazquez Sandoval, I., Atashpendar, A., Lenzini, G., & Ryan, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S. Obaidat & J. Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer. doi:10.1007/978-3-030-90428-9_5
Peer reviewed

Cheng, H., Fotiadis, G., Groszschädl, J., Ryan, P. Y. A., & Roenne, P. (August 2021). Batching CSIDH Group Actions using AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2021 (4), 618-649. doi:10.46586/tches.v2021.i4.618-649
Peer reviewed

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2021). AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. In 2021 Design, Automation and Test in Europe Conference and Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021, Proceedings (pp. 1272-1277). IEEE. doi:10.23919/DATE51398.2021.9474033
Peer reviewed

Jamroga, W., Mestel, D., Roenne, P., Ryan, P. Y. A., & Skrobot, M. (2021). A Survey of Requirements for COVID-19 Mitigation Strategies. Bulletin of The Polish Academy of Sciences: Technical Science, 69 (4), 137724. doi:10.24425/bpasts.2021.137724
Peer reviewed

Jamroga, W., Ryan, P. Y. A., Schneider, S., Schürmann, C., & Stark, P. B. (2021). A Declaration of Software Independence. In Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (pp. 198--217). Springer. doi:10.1007/978-3-030-91631-2\_11
Peer reviewed

RYAN, P. Y. A., ROENNE, P., OSTREV, D., El Orche, F.-E., SOROUSH, N., & Stark, P. B. (2021). Who Was that Masked Voter? The Tally Won’t Tell! In R. Krimmer & D. Duenas-Cid (Eds.), Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-030-86942-7_8
Peer reviewed

ROENNE, P., RYAN, P. Y. A., & SMYTH, B. (2021). Cast-as-Intended: A Formal Definition and Case Studies. In M. Bernhard (Ed.), Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-662-63958-0_22
Peer reviewed

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. Y. A. (2020). Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. In P.-Y. Liardet & N. Mentens (Eds.), Smart Card Research and Advanced Applications, 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers (pp. 18-33). Springer Verlag. doi:10.1007/978-3-030-68487-7_2
Peer reviewed

Cheng, H., Groszschädl, J., Tian, J., Roenne, P., & Ryan, P. Y. A. (2020). High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. In O. Dunkelman, M. J. Jacobson Jr., ... C. O'Flynn (Eds.), Selected Areas in Cryptography, 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (pp. 698-719). Springer Verlag. doi:10.1007/978-3-030-81652-0_27
Peer reviewed

Zollinger, M.-L., Roenne, P., & Ryan, P. (2020). Short paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme. In International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting.
Peer reviewed

Jamroga, W., Mestel, D., Roenne, P., Ryan, P. Y. A., & Skrobot, M. (2020). A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46104.

Estaji, E., Haines, T., Gjoesteen, K., Roenne, P., Ryan, P. Y. A., & Soroush, N. (2020). Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. In Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings (pp. 50--66). Springer. doi:10.1007/978-3-030-60347-2\_4
Peer reviewed

Jamroga, W., Kim, Y., Kurpiewski, D., & Ryan, P. Y. A. (2020). Towards Model Checking of Voting Protocols in Uppaal. In Proceedings of the Fifth International Joint Conference on Electronic Voting E-VOTE-ID 2020. Springer. doi:10.1007/978-3-030-60347-2_9
Peer reviewed

Roenne, P., Atashpendar, A., Kristian, G., & Ryan, P. (2020). Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. In Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC. Springer.
Peer reviewed

Iovino, V., Rial, A., Roenne, P., & Ryan, P. Y. A. (2020). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. In 2020 IEEE 33rd Computer Security Foundations Symposium.
Peer reviewed

Soroush, N., Iovino, V., Rial, A., Roenne, P., & Ryan, P. Y. A. (2020). Verifiable Inner Product Encryption Scheme. In Public-Key Cryptography – PKC 2020.
Peer reviewed

Hollenstein, M., Naccache, D., Roenne, P., Ryan, P. Y. A., Weil, R., & Yifrach-Stav, O. (2020). Preservation of DNA Privacy During the Large Scale Detection of COVID-19. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/45354.

Ding, J., Emery, D., Mueller, J., Ryan, P. Y. A., & Kee Wong, V. (2020). Post-Quantum Anonymous Veto Networks. In E-Vote-ID 2020.
Peer reviewed

Cheng, H., Dinu, D.-D., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things. In M. Laurent & T. Giannetsos (Eds.), Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 103-119). Springer Verlag. doi:10.1007/978-3-030-41702-4_7
Peer reviewed

Beunardeau, M., El Orche, F. E., Maimut, D., Naccache, D., Roenne, P., & Ryan, P. (2019). Authenticated Key Distribution: When the Coupon Collector is Your Enemy. In Innovative Security Solutions for Information Technology and Communications. Springer.

Zollinger, M.-L., Distler, V., Roenne, P., Ryan, P., Lallemand, C., & Koenig, V. (2019). User Experience Design for E-Voting: How mental models align with security mechanisms. In Electronic Voting.
Peer reviewed

Cheng, H., Groszschädl, J., Roenne, P., & Ryan, P. (2019). A Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/42597.

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7
Peer reviewed

Damodaran, A. S. S., Rial, A., & Ryan, P. Y. A. (04 June 2019). Stateful Zero-Knowledge [Poster presentation]. SnT Partnership Day 2019.

Distler, V., Zollinger, M.-L., Lallemand, C., Roenne, P., Ryan, P., & Koenig, V. (2019). Security – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019). doi:10.1145/3290605.3300835
Peer reviewed

Marky, K., Zollinger, M.-L., Funk, M., Ryan, P., & Mühlhäuser, M. (2019). How to Assess the Usability Metrics of E-Voting Schemes. Lecture Notes in Computer Science.
Peer reviewed

Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (2019). An offline dictionary attack against zkPAKE protocol. In An offline dictionary attack against zkPAKE protocol. Springer.
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5
Peer reviewed

Wang, J., Tang, Q., Delerue Arriaga, A., & Ryan, P. Y. A. (2019). Novel Collaborative Filtering Recommender Friendly to Privacy Protection. In International Joint Conference on Artificial Intelligence (IJCAI 2019), Macao 10-16 August 2019. Macao, Unknown/unspecified: International Joint Conferences on Artificial Intelligence Organization. doi:10.24963/ijcai.2019/668
Peer reviewed

Jamroga, W., Roenne, P., Ryan, P., & Stark, P. B. (2019). Risk-Limiting Tallies. In Electronic Voting: Proceedings of E-Vote-ID (pp. 183--199). doi:10.1007/978-3-030-30625-0\_12
Peer reviewed

Lopez Becerra, J. M., Roenne, P., Ryan, P., & Sala, P. (2018). HoneyPAKEs. In Security Protocols XXVI: Lecture Notes in Computer Science (pp. 63-77). Springer International Publishing.
Peer reviewed

Atashpendar, A., Policharla, G. V., Roenne, P., & Ryan, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. In Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (pp. 104-120). Springer. doi:10.1007/978-3-030-03638-6_7
Peer reviewed

Roenne, P., Ryan, P., & Zollinger, M.-L. (2018). Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/37857.

Wang, J., Delerue Arriaga, A., Tang, Q., & Ryan, P. (October 2018). Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning [Poster presentation]. the 2018 ACM SIGSAC Conference. doi:10.1145/3243734.3278504

Atashpendar, A., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/36637.

Lopez Becerra, J. M., Ryan, P., Sala, P., & Skrobot, M. (June 2018). An Offline Dictionary Attack Against zkPAKE Protocol [Poster presentation]. WiSec2018, Stockholm, Sweden. doi:10.1145/1235

Schwartz, M., Lenzini, G., Geng, Y., Roenne, P., Ryan, P., & Lagerwall, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382
Peer reviewed

Atashpendar, A., Beunardeau, M., Connolly, A., Géraud, R., Mestel, D., Roscoe, A. W. B., & Ryan, P. (2018). From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/36636.

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018.
Peer reviewed

Genç, Z. A., Lenzini, G., Ryan, P., & Vazquez Sandoval, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24
Peer reviewed

Lenzini, G., Samir, O., Roenne, P., Ryan, P., Geng, Y., Noh, J., & Lagerwall, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. In Proc. of the 9th IEEE Workshop on Information Forensics and Security.
Peer reviewed

Atashpendar, A., Roenne, P., Ostrev, D., & Ryan, P. (14 June 2017). Deniability in Quantum Cryptography [Poster presentation]. The 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), Paris, France.

Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (01 June 2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307. doi:10.1016/j.cose.2016.12.005
Peer reviewed

Iovino, V., Rial, A., Roenne, P., & Ryan, P. (2017). Using Selene to Verify your Vote in JCJ. In Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17).
Peer reviewed

Genç, Z. A., Lenzini, G., & Ryan, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press.
Peer reviewed

Clark, J., Sarah, Ryan, P., Wallach, D., Brenner, M., & Rohloff, K. (Eds.). (2016). Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC. Barbados: Springer.

Ryan, P., Naccache, D., & Quisquater, J.-J. (Eds.). (2016). The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer.

Hao, F., & Ryan, P. (Eds.). (2016). Real-World Electronic Voting: Design, Analysis and Deployment. Auerbach Publications. doi:10.1201/9781315371290

Ryan, P. (2016). Crypto Santa. In The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer.
Peer reviewed

Gallegos-Garcia, G., Iovino, V., Roenne, P., & Ryan, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/31726.

Tabatabaei, M., Jamroga, W., & Ryan, P. (2016). Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. In The International Workshop on AI for Privacy and Security (PrAISe), 2016.
Peer reviewed

Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (30 December 2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318. doi:10.1007/978-3-319-25915-4_16
Peer reviewed

Atashpendar, A., Roscoe, B., & Ryan, P. (2015). Information Leakage due to Revealing Randomly Selected Bits. In Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (pp. 325-341). Springer. doi:10.1007/978-3-319-26096-9_33
Peer reviewed

Ryan, P., Preneel, B., Rogaway, P., & Ryan, M. D. (2015). Privacy and Security in an Age of Surveillance.

Ryan, P., Benaloh, J., Rivest, R., Stark, P., Teague, V., & Vora, P. (2015). End-to-end verifiability. arXiv preprint arXiv:1504.03778.
Peer reviewed

Bella, G., Giustolisi, R., Lenzini, G., & Ryan, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015.
Peer reviewed

Ryan, P., Roenne, P., & Iovino, V. (2015). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105.
Peer reviewed

Ryan, P., Schneider, S., & Teague, V. (2015). End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Security and Privacy, 13 (3), 59-62. doi:10.1109/MSP.2015.54
Peer reviewed

Ryan, P., Phatak, D. S., Tang, Q., Smith, W. D., Sherman, A. T., & Kalpakis, K. (2014). DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptology ePrint Archive.
Peer reviewed

Delerue Arriaga, A., Tang, Q., & Ryan, P. (2014). Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. In Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014.
Peer reviewed

Culnane, C., Ryan, P., Schneider, S., & Teague, V. (2014). vVote: a Verifiable Voting System. Jets. doi:10.1145/2746338
Peer reviewed

Preneel, B., Rogaway, P., Ryan, M. D., & Ryan, P. (2014). Privacy and Security in an Age of Surveillance. Dagstuhl Reports, 4 (9), 106-123. doi:10.4230/DagRep.4.9.106
Peer reviewed

Dreier, J., Giustolisi, R., Kassem, A., Lafourcade, P., Lenzini, G., & Ryan, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112
Peer reviewed

Giustolisi, R., Lenzini, G., & Ryan, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5
Peer reviewed

Culnane, C., Heather, J., Joaquim, R., Ryan, P., Schneider, S., & Teague, V. (December 2013). Faster Print on Demand for Prêt à Voter. Journal of Election Technology and Systems, 2 (1).
Peer reviewed

Khader, D., Ryan, P., & Tang, Q. (13 August 2013). Proving Prêt à Voter Receipt Free Using Computational Security Models. USENIX Journal of Election Technology and Systems, 1 (1), 62-81.
Peer reviewed

Tabatabaei, M., Jamroga, W., & Ryan, P. (17 March 2013). Preventing Coercion in E-Voting: Be Open and Commit [Paper presentation]. 1st Workshop on Hot Issues in Security Principles and Trust.

Lancrenon, J., Khader, D., Ryan, P., & Hao, F. (2013). Password-based Authenticated Key Establishment Protocols. In Computer And Information Security Handbook (pp. 300-350). Elsevier. doi:10.1016/B978-0-12-394397-2.00040-4

Ryan, P., Grewal, G. S., Ryan, M. D., & Bursuc, S. (2013). Caveat Coercitor: coercion-evidence in electronic voting. In 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (pp. 367-381). doi:10.1109/SP.2013.32
Peer reviewed

Ryan, P., Teague, V., Schneider, S., Joaquim, R., Heather, J., & Culnane, C. (2013). Faster print on demand for Prêt à Voter. USENIX Journal of Election Technology and Systems (JETS), 2 (1).
Peer reviewed

Ryan, P., Peacock, T., Schneider, S., & Xia, Z. (2013). Verifiable Voting Systems. In Computer and Information Security Handbook (pp. 1103-1125). Elsevier Inc. doi:10.1016/B978-0-12-394397-2.00069-6
Peer reviewed

Ryan, P., & Christianson, B. (2013). Enhancements to prepare-and-measure based QKD protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 123-133). Springer Verlag. doi:10.1007/978-3-642-41717-7_14
Peer reviewed

Ryan, P., Benaloh, J., & Teague, V. (2013). Verifiable postal voting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). doi:10.1007/978-3-642-41717-7_8
Peer reviewed

Ryan, P., Schneider, S., Xia, Z., Llewellyn, M., Heather, J., & Culnane, C. (2013). Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. 53 USENIX Journal of Election Technology and Systems (JETS), 1 (1), 53-61.
Peer reviewed

Ryan, P., Pouly, M., & Kohlas, J. (2013). Generalized Information Theory for Hints. International Journal of Approximate Reasoning, 54 (1), 228-251. doi:10.1016/j.ijar.2012.08.004
Peer reviewed

Ryan, P., Demirel, D., Henning, M., van de Graaf, J., & Buchmann, J. (2013). Prêt à Voter providing everlasting privacy. Lecture Notes in Computer Science, 165-220. doi:10.1007/978-3-642-39185-9_10
Peer reviewed

Ryan, P., Schneider, S., Peacock, T., Heather, J., Srinivasan, S., Teague, V., Xia, Z., Wen, R., Culnane, C., & Burton, C. (2012). Using Prêt à Voter in Victorian State Elections. Electronic Voting Technology Workshop/Workshop on Trustworthy Elections.
Peer reviewed

Ryan, P., & Coles-Kemp, L. (2012). Foreword from the Programme Chairs-STAST 2012. Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on. doi:10.1109/STAST.2012.5
Peer reviewed

Burton, C. B., Culnane, C., Heather, J., Peacock, T., Ryan, P., Schneider, S., Teague, V., Wen, R., Xia, Z., & Srinivasan, S. (2012). A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. EVOTE 2012, 1-10.
Peer reviewed

Khader, D., Smyth, B., Ryan, P., & Hao, F. (2012). A Fair and Robust Voting System by Broadcast. Lecture Notes in Informatics, 285-299.
Peer reviewed

Kramer, S., & Ryan, P. (2011). A Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems. In 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (pp. 9 - 21). IEEE. doi:10.1109/REVOTE.2011.6045911
Peer reviewed

Coles-Kemp, L., Lenzini, G., Ryan, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE.

Xia, Z., Culnane, C., Heather, J., Jonker, H., Ryan, P., Schneider, S., & Srinivasan, S. (2010). Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. In Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (pp. 98–114). Springer-Verlag. doi:10.1007/978-3-642-17401-8_8
Peer reviewed

Mauw, S., Radomirovic, S., & Ryan, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag.
Peer reviewed

Contact ORBilu