![]() ![]() | MOSAHEB, R., ROENNE, P., RYAN, P. Y. A., & Sarfaraz, S. (2025). Direct and Transparent Voter Verification with Everlasting Receipt-Freeness. In D. Duenas-Cid (Ed.), Electronic Voting - 9th International Joint Conference, E-Vote-ID 2024, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-72244-8_8 ![]() |
![]() ![]() | Zollinger, M.-L., ROENNE, P., Schneider, S., RYAN, P. Y. A., & Jamroga, W. (2025). Intelligo Ut Confido: Understanding, Trust and User Experience in Verifiable Receipt-Free E-Voting. In D. Duenas-Cid (Ed.), Electronic Voting - 9th International Joint Conference, E-Vote-ID 2024, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-72244-8_10 ![]() |
![]() ![]() | JAMROGA, W., ROENNE, P., KIM, Y., & RYAN, P. Y. A. (2024). “You Shall Not Abstain!” A Formal Study of Forced Participation. In J. Budurushi (Ed.), Financial Cryptography and Data Security. FC 2024 International Workshops - Voting, DeFI, WTSC, CoDecFin, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-031-69231-4_5 ![]() |
![]() ![]() | RENCKENS, J., ROENNE, P., GROSZSCHÄDL, J., & RYAN, P. Y. A. (2024). An Evaluation of Post-Quantum and Hybrid Noise Protocol Variants on Mobile Devices. In L. MOROGAN & P. ROENNE (Eds.), Innovative Security Solutions for Information Technology and Communications, 17th International Conference, SECITC 2024, Virtual Event, November 21-22, 2024, Revised Selected Papers. Springer Verlag. ![]() |
![]() ![]() | DELERUE ARRIAGA, A., RYAN, P. Y. A., & SKROBOT, M. (2024). SweetPAKE: Key exchange with decoy passwords. In SweetPAKE: Key exchange with decoy passwords (pp. 1017–1033). United States: Association for Computing Machinery, Inc. doi:10.1145/3634737.3645009 ![]() |
![]() ![]() | CHENG, H., FOTIADIS, G., GROSZSCHÄDL, J., PAGE, D., PHAM, T., & RYAN, P. Y. A. (2024). RISC-V Instruction Set Extensions for Multi-Precision Integer Arithmetic. In 61st ACM/IEEE Design Automation Conference, DAC 2024, San Francisco, CA, USA, June 23-27, 2024, Proceedings. ACM/IEEE. doi:10.1145/3649329.3657347 ![]() |
![]() ![]() | Arenas, M. P., LENZINI, G., RAKEEI, M., RYAN, P. Y. A., SKROBOT, M., & ZHEKOVA, M. (2024). Verifying Artifact Authenticity with Unclonable Optical Tags. In S. D. C. Di Vimercati (Ed.), Proceedings of the 21st International Conference on Security and Cryptography, SECRYPT 2024. Science and Technology Publications, Lda. doi:10.5220/0012746500003767 ![]() |
![]() ![]() | CHENG, H., FOTIADIS, G., GROSZSCHÄDL, J., & RYAN, P. Y. A. (2023). IoTDisco: Strong yet Lightweight End-to-End Security for the Internet of Constrained Things. In S. Bouzefrane, S. Banerjee, F. Mourlin, S. Boumerdassi, ... E. Renault (Eds.), Mobile, Secure, and Programmable Networking: 9th International Conference, MSPN 2023, Paris, France, October 26–27, 2023, Revised Selected Papers (pp. 1-16). Cham, Switzerland: Springer Verlag. doi:10.1007/978-3-031-52426-4_1 ![]() |
![]() ![]() | DAMODARAN, A. S. S., FOTIADIS, G., & RYAN, P. Y. A. (30 June 2023). Preparing for a Quantum-Resistant Era [Poster presentation]. ICT Spring 2023, Luxembourg City, Luxembourg. |
![]() ![]() | ZOLLINGER, M.-L., RYAN, P. Y. A., ROENNE, P., IOVINO, V., RIAL, A., & DAMODARAN, A. S. S. (11 May 2023). Selene: A Usable Voting System with Transparent Verifiability and Coercion Mitigation [Poster presentation]. SnT Partnership Day 2023, Luxembourg City, Luxembourg. |
![]() ![]() | CHENG, H., FOTIADIS, G., GROSZSCHÄDL, J., & RYAN, P. Y. A. (February 2022). Highly Vectorized SIKE for AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2022 (2), 41-68. doi:10.46586/tches.v2022.i2.41-68 ![]() |
![]() ![]() | VAZQUEZ SANDOVAL, I., Atashpendar, A., LENZINI, G., & RYAN, P. Y. A. (2021). PakeMail: Authentication and Key Management in Decentralized Secure Email and Messaging via PAKE. In M. S. Obaidat & J. Ben-Othman (Eds.), E-Business and Telecommunications - 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8-10, 2020, Revised Selected Papers (pp. 102-128). Springer. doi:10.1007/978-3-030-90428-9_5 ![]() |
![]() ![]() | Marky, K., ZOLLINGER, M.-L., Roenne, P., RYAN, P. Y. A., Grube, T., & Kunze, K. (October 2021). Investigating Usability and User Experience of Individually Verifiable Internet Voting Schemes. ACM Transactions on Computer-Human Interaction, 28 (5), 1-36. doi:10.1145/3459604 ![]() |
![]() ![]() | ZOLLINGER, M.-L., ESTAJI, E., RYAN, P. Y. A., & Marky, K. (2021). "Just for the sake of transparency": Exploring Voter Mental Models Of Verifiability. In Electronic Voting, Sixth International Joint Conference, E-Vote-ID 2021, Bregenz, Austria, October 5-8. ![]() |
![]() ![]() | CHENG, H., FOTIADIS, G., GROSZSCHÄDL, J., RYAN, P. Y. A., & ROENNE, P. (August 2021). Batching CSIDH Group Actions using AVX-512. IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2021 (4), 618-649. doi:10.46586/tches.v2021.i4.618-649 ![]() |
![]() ![]() | CHENG, H., GROSZSCHÄDL, J., ROENNE, P., & RYAN, P. Y. A. (2021). AVRNTRU: Lightweight NTRU-based Post-Quantum Cryptography for 8-bit AVR Microcontrollers. In 2021 Design, Automation and Test in Europe Conference and Exhibition, DATE 2021, Grenoble, France, February 1-5, 2021, Proceedings (pp. 1272-1277). IEEE. doi:10.23919/DATE51398.2021.9474033 ![]() |
JAMROGA, W., RYAN, P. Y. A., Schneider, S., Schürmann, C., & Stark, P. B. (2021). A Declaration of Software Independence. In Protocols, Strands, and Logic - Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday (pp. 198--217). Springer. doi:10.1007/978-3-030-91631-2\_11 ![]() |
![]() ![]() | JAMROGA, W., MESTEL, D., ROENNE, P., RYAN, P. Y. A., & SKROBOT, M. (2021). A Survey of Requirements for COVID-19 Mitigation Strategies. Bulletin of the Polish Academy of Sciences: Technical Sciences, 69 (4), 137724. doi:10.24425/bpasts.2021.137724 ![]() |
![]() ![]() | RYAN, P. Y. A., ROENNE, P., OSTREV, D., El Orche, F.-E., SOROUSH, N., & Stark, P. B. (2021). Who Was that Masked Voter? The Tally Won’t Tell! In R. Krimmer & D. Duenas-Cid (Eds.), Electronic Voting - 6th International Joint Conference, E-Vote-ID 2021, Proceedings. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-030-86942-7_8 ![]() |
![]() ![]() | ROENNE, P., RYAN, P. Y. A., & SMYTH, B. (2021). Cast-as-Intended: A Formal Definition and Case Studies. In M. Bernhard (Ed.), Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Revised Selected Papers. Springer Science and Business Media Deutschland GmbH. doi:10.1007/978-3-662-63958-0_22 ![]() |
![]() ![]() | CHENG, H., GROSZSCHÄDL, J., ROENNE, P., & RYAN, P. Y. A. (2020). Lightweight Post-quantum Key Encapsulation for 8-bit AVR Microcontrollers. In P.-Y. Liardet & N. Mentens (Eds.), Smart Card Research and Advanced Applications, 19th International Conference, CARDIS 2020, Virtual Event, November 18–19, 2020, Revised Selected Papers (pp. 18-33). Springer Verlag. doi:10.1007/978-3-030-68487-7_2 ![]() |
![]() ![]() | CHENG, H., GROSZSCHÄDL, J., TIAN, J., ROENNE, P., & RYAN, P. Y. A. (2020). High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions. In O. Dunkelman, M. J. Jacobson Jr., ... C. O'Flynn (Eds.), Selected Areas in Cryptography, 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers (pp. 698-719). Springer Verlag. doi:10.1007/978-3-030-81652-0_27 ![]() |
![]() ![]() | ZOLLINGER, M.-L., ROENNE, P., & RYAN, P. (2020). Short paper: Mechanized Proofs of Verifiability and Privacy in a paper-based e-voting Scheme. In International Conference on Financial Crypto Workshop on Advances in Secure Electronic Voting. ![]() |
![]() ![]() | Ding, J., Emery, D., MUELLER, J., RYAN, P. Y. A., & Kee Wong, V. (2020). Post-Quantum Anonymous Veto Networks. In E-Vote-ID 2020. ![]() |
![]() ![]() | Hollenstein, M., Naccache, D., ROENNE, P., RYAN, P. Y. A., Weil, R., & Yifrach-Stav, O. (2020). Preservation of DNA Privacy During the Large Scale Detection of COVID-19. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/45354. |
![]() ![]() | ROENNE, P., ATASHPENDAR, A., Kristian, G., & RYAN, P. (2020). Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme. In Financial Cryptography and Data Security 2019. FC 2019: International Workshops, CIW, VOTING, and WTSC. Springer. ![]() |
![]() ![]() | JAMROGA, W., MESTEL, D., ROENNE, P., RYAN, P. Y. A., & SKROBOT, M. (2020). A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/46104. |
![]() ![]() | ESTAJI, E., Haines, T., Gjoesteen, K., ROENNE, P., RYAN, P. Y. A., & SOROUSH, N. (2020). Revisiting Practical and Usable Coercion-Resistant Remote E-Voting. In Electronic Voting - 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6-9, 2020, Proceedings (pp. 50--66). Springer. doi:10.1007/978-3-030-60347-2\_4 ![]() |
![]() ![]() | JAMROGA, W., KIM, Y., Kurpiewski, D., & RYAN, P. Y. A. (2020). Towards Model Checking of Voting Protocols in Uppaal. In Proceedings of the Fifth International Joint Conference on Electronic Voting E-VOTE-ID 2020. Springer. doi:10.1007/978-3-030-60347-2_9 ![]() |
![]() ![]() | Iovino, V., RIAL, A., ROENNE, P., & RYAN, P. Y. A. (2020). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. In 2020 IEEE 33rd Computer Security Foundations Symposium. ![]() |
![]() ![]() | SOROUSH, N., Iovino, V., RIAL, A., ROENNE, P., & RYAN, P. Y. A. (2020). Verifiable Inner Product Encryption Scheme. In Public-Key Cryptography – PKC 2020. ![]() |
![]() ![]() | CHENG, H., Dinu, D.-D., GROSZSCHÄDL, J., ROENNE, P., & RYAN, P. (2019). A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things. In M. Laurent & T. Giannetsos (Eds.), Information Security Theory and Practice, 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (pp. 103-119). Springer Verlag. doi:10.1007/978-3-030-41702-4_7 ![]() |
![]() ![]() | Beunardeau, M., EL ORCHE, F. E., Maimut, D., Naccache, D., ROENNE, P., & RYAN, P. (2019). Authenticated Key Distribution: When the Coupon Collector is Your Enemy. In Innovative Security Solutions for Information Technology and Communications. Springer. |
![]() ![]() | ZOLLINGER, M.-L., DISTLER, V., ROENNE, P., RYAN, P., LALLEMAND, C., & KOENIG, V. (2019). User Experience Design for E-Voting: How mental models align with security mechanisms. In Electronic Voting. ![]() |
![]() ![]() | CHENG, H., GROSZSCHÄDL, J., ROENNE, P., & RYAN, P. (2019). A Lightweight Implementation of NTRUEncrypt for 8-bit AVR Microcontrollers. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/42597. |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2019). A Critical Security Analysis of the Password-Based Authentication Honeywords System Under Code-Corruption Attack. In Information Systems Security and Privacy (pp. 125-151). Cham, Unknown/unspecified: Springer International Publishing. doi:10.1007/978-3-030-25109-3_7 ![]() |
![]() ![]() | DAMODARAN, A. S. S., RIAL, A., & RYAN, P. Y. A. (04 June 2019). Stateful Zero-Knowledge [Poster presentation]. SnT Partnership Day 2019. |
![]() ![]() | DISTLER, V., ZOLLINGER, M.-L., LALLEMAND, C., ROENNE, P., RYAN, P., & KOENIG, V. (2019). Security – Visible, Yet Unseen? How Displaying Security Mechanisms Impacts User Experience and Perceived Security. Proceedings of ACM CHI Conference on Human Factors in Computing Systems (CHI2019). doi:10.1145/3290605.3300835 ![]() |
![]() ![]() | Marky, K., ZOLLINGER, M.-L., Funk, M., RYAN, P., & Mühlhäuser, M. (2019). How to Assess the Usability Metrics of E-Voting Schemes. Lecture Notes in Computer Science. ![]() |
![]() ![]() | JAMROGA, W., ROENNE, P., RYAN, P., & Stark, P. B. (2019). Risk-Limiting Tallies. In Electronic Voting: Proceedings of E-Vote-ID (pp. 183--199). doi:10.1007/978-3-030-30625-0\_12 ![]() |
![]() ![]() | LOPEZ BECERRA, J. M., RYAN, P., SALA, P., & Skrobot, M. (2019). An offline dictionary attack against zkPAKE protocol. In An offline dictionary attack against zkPAKE protocol. Springer. ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2019). NoCry: No More Secure Encryption Keys for Cryptographic Ransomware. In Proceedings of the Second International Workshop on Emerging Technologies for Authorization and Authentication (pp. 69-85). Cham, Switzerland: Springer. doi:10.1007/978-3-030-39749-4_5 ![]() |
![]() ![]() | Wang, J., Tang, Q., DELERUE ARRIAGA, A., & RYAN, P. Y. A. (2019). Novel Collaborative Filtering Recommender Friendly to Privacy Protection. In International Joint Conference on Artificial Intelligence (IJCAI 2019), Macao 10-16 August 2019. Macao, Unknown/unspecified: International Joint Conferences on Artificial Intelligence Organization. doi:10.24963/ijcai.2019/668 ![]() |
![]() ![]() | LOPEZ BECERRA, J. M., ROENNE, P., RYAN, P., & SALA, P. (2018). HoneyPAKEs. In Security Protocols XXVI: Lecture Notes in Computer Science (pp. 63-77). Springer International Publishing. ![]() |
![]() ![]() | ATASHPENDAR, A., Policharla, G. V., ROENNE, P., & RYAN, P. (2018). Revisiting Deniability in Quantum Key Exchange via Covert Communication and Entanglement Distillation. In Secure IT Systems, 23rd Nordic Conference, NordSec 2018. Lecture Notes in Computer Science, vol 11252. Springer, Cham (pp. 104-120). Springer. doi:10.1007/978-3-030-03638-6_7 ![]() |
![]() ![]() | ROENNE, P., RYAN, P., & ZOLLINGER, M.-L. (2018). Electryo, In-person Voting with Transparent Voter Verifiability and Eligibility Verifiability. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/37857. |
WANG, J., DELERUE ARRIAGA, A., Tang, Q., & RYAN, P. (October 2018). Facilitating Privacy-preserving Recommendation-as-a-Service with Machine Learning [Poster presentation]. the 2018 ACM SIGSAC Conference. doi:10.1145/3243734.3278504 |
![]() ![]() | ATASHPENDAR, A., MESTEL, D., Roscoe, A. W. B., & RYAN, P. (2018). A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/36637. |
![]() ![]() | LOPEZ BECERRA, J. M., RYAN, P., SALA, P., & Skrobot, M. (June 2018). An Offline Dictionary Attack Against zkPAKE Protocol [Poster presentation]. WiSec2018, Stockholm, Sweden. doi:10.1145/1235 |
![]() ![]() | Schwartz, M., LENZINI, G., GENG, Y., ROENNE, P., RYAN, P., & LAGERWALL, J. (2018). Cholesteric Liquid Crystal Shells as Enabling Material for Information-Rich Design and Architecture. Advanced Materials, 1707382. doi:10.1002/adma.201707382 ![]() |
![]() ![]() | ATASHPENDAR, A., Beunardeau, M., Connolly, A., Géraud, R., MESTEL, D., Roscoe, A. W. B., & RYAN, P. (2018). From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/36636. |
![]() ![]() | GENÇ, Z. A., LENZINI, G., RYAN, P., & VAZQUEZ SANDOVAL, I. (2018). A Security Analysis, and a Fix, of a Code-Corrupted Honeywords System. In Proceedings of the 4th International Conference on Information Systems Security and Privacy. doi:10.5220/0006609100830095 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware. In Advances in Cybersecurity 2018. ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). No Random, No Ransom: A Key to Stop Cryptographic Ransomware. In Proceedings of the 15th Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 234-255). Cham, Switzerland: Springer. doi:10.1007/978-3-319-93411-2_11 ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2018). Next Generation Cryptographic Ransomware. In Proceedings of the Secure IT Systems (pp. 385-401). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-030-03638-6_24 ![]() |
![]() ![]() | LENZINI, G., Samir, O., ROENNE, P., RYAN, P., Geng, Y., NOH, J., & LAGERWALL, J. (2017). Security in the Shell : An Optical Physical Unclonable Function made of Shells of Cholesteric Liquid Crystals. In Proc. of the 9th IEEE Workshop on Information Forensics and Security. ![]() |
ATASHPENDAR, A., ROENNE, P., OSTREV, D., & RYAN, P. (14 June 2017). Deniability in Quantum Cryptography [Poster presentation]. The 12th Conference on the Theory of Quantum Computation, Communication and Cryptography (TQC 2017), Paris, France. |
![]() ![]() | Bella, G., Giustolisi, R., LENZINI, G., & RYAN, P. (01 June 2017). Trustworthy exams without trusted parties. Computer and Security, 67, 291-307. doi:10.1016/j.cose.2016.12.005 ![]() |
![]() ![]() | IOVINO, V., RIAL, A., ROENNE, P., & RYAN, P. (2017). Using Selene to Verify your Vote in JCJ. In Workshop on Advances in Secure Electronic Voting (VOTING'17) (pp. 17). ![]() |
![]() ![]() | GENÇ, Z. A., LENZINI, G., & RYAN, P. (2017). The Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware. In Advances in Cybersecurity 2017 (1st ed). Maribor, Slovenia: University of Maribor Press. ![]() |
Hao, F., & RYAN, P. (Eds.). (2016). Real-World Electronic Voting: Design, Analysis and Deployment. Auerbach Publications. doi:10.1201/9781315371290 |
RYAN, P. (2016). Crypto Santa. In The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer. ![]() |
RYAN, P., Naccache, D., & Quisquater, J.-J. (Eds.). (2016). The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Springer. |
Gallegos-Garcia, G., IOVINO, V., ROENNE, P., & RYAN, P. (2016). (Universal) Unconditional Verifiability in E-Voting without Trusted Parties. ORBilu-University of Luxembourg. https://orbilu.uni.lu/handle/10993/31726. |
Clark, J., Sarah, RYAN, P., Wallach, D., Brenner, M., & Rohloff, K. (Eds.). (2016). Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC. Barbados: Springer. |
![]() ![]() | TABATABAEI, M., JAMROGA, W., & RYAN, P. (2016). Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt. In The International Workshop on AI for Privacy and Security (PrAISe), 2016. ![]() |
![]() ![]() | Dreier, J., Giustosi, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (30 December 2015). Formal Security Analysis of Traditional and Electronic Exams. Communications in Computer and Information Science, 554, 294-318. doi:10.1007/978-3-319-25915-4_16 ![]() |
![]() ![]() | ATASHPENDAR, A., Roscoe, B., & RYAN, P. (2015). Information Leakage due to Revealing Randomly Selected Bits. In Security Protocols XXIII: Lecture Notes in Computer Science, Volume 9379, 2015 (pp. 325-341). Springer. doi:10.1007/978-3-319-26096-9_33 ![]() |
![]() ![]() | RYAN, P., Preneel, B., Rogaway, P., & Ryan, M. D. (2015). Privacy and Security in an Age of Surveillance. https://orbilu.uni.lu/handle/10993/25431 |
![]() ![]() | RYAN, P., Benaloh, J., Rivest, R., Stark, P., Teague, V., & Vora, P. (2015). End-to-end verifiability. arXiv preprint arXiv:1504.03778. ![]() |
![]() ![]() | Bella, G., GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2015). A Secure Exam Protocol Without Trusted Parties. In ICT Systems Security and Privacy Protection. 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015. ![]() |
![]() ![]() | RYAN, P., ROENNE, P., & IOVINO, V. (2015). Selene: Voting with Transparent Verifiability and Coercion-Mitigation. Abstract book of 1st Workshop on Advances in Secure Electronic Voting, 2015, 1105. ![]() |
![]() ![]() | RYAN, P., Schneider, S., & Teague, V. (2015). End-to-End Verifiability in Voting Systems, from Theory to Practice. IEEE Security and Privacy, 13 (3), 59-62. doi:10.1109/MSP.2015.54 ![]() |
![]() ![]() | GIUSTOLISI, R., LENZINI, G., & RYAN, P. (2014). Remark!: A Secure Protocol for Remote Exams. Security Protocols XXII - Lecture Notes in Computer Science. doi:10.1007/978-3-319-12400-1_5 ![]() |
![]() ![]() | Dreier, J., GIUSTOLISI, R., Kassem, A., Lafourcade, P., LENZINI, G., & RYAN, P. (2014). Formal Analysis of Electronic Exams. In SECRYPT 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014. doi:10.5220/0005050901010112 ![]() |
![]() ![]() | DELERUE ARRIAGA, A., TANG, Q., & RYAN, P. (2014). Trapdoor Privacy in Asymmetric Searchable Encryption Schemes. In Progress in Cryptology -- AFRICACRYPT 2014, Marrakesh 28-30 May 2014. ![]() |
![]() ![]() | RYAN, P., Phatak, D. S., Tang, Q., Smith, W. D., Sherman, A. T., & Kalpakis, K. (2014). DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity. IACR Cryptology ePrint Archive. ![]() |
![]() ![]() | Culnane, C., RYAN, P., Schneider, S., & Teague, V. (2014). vVote: a Verifiable Voting System. Jets. doi:10.1145/2746338 ![]() |
![]() ![]() | Preneel, B., Rogaway, P., Ryan, M. D., & RYAN, P. (2014). Privacy and Security in an Age of Surveillance. Dagstuhl Reports, 4 (9), 106-123. doi:10.4230/DagRep.4.9.106 ![]() |
![]() ![]() | Culnane, C., Heather, J., JOAQUIM, R., RYAN, P., Schneider, S., & Teague, V. (December 2013). Faster Print on Demand for Prêt à Voter. Journal of Election Technology and Systems, 2 (1). ![]() |
![]() ![]() | KHADER, D., RYAN, P., & TANG, Q. (13 August 2013). Proving Prêt à Voter Receipt Free Using Computational Security Models. USENIX Journal of Election Technology and Systems, 1 (1), 62-81. ![]() |
![]() ![]() | TABATABAEI, M., JAMROGA, W., & RYAN, P. (17 March 2013). Preventing Coercion in E-Voting: Be Open and Commit [Paper presentation]. 1st Workshop on Hot Issues in Security Principles and Trust. |
LANCRENON, J., KHADER, D., RYAN, P., & Hao, F. (2013). Password-based Authenticated Key Establishment Protocols. In Computer And Information Security Handbook (pp. 300-350). Elsevier. doi:10.1016/B978-0-12-394397-2.00040-4 |
![]() ![]() | RYAN, P., Grewal, G. S., Ryan, M. D., & Bursuc, S. (2013). Caveat Coercitor: coercion-evidence in electronic voting. In 2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (pp. 367-381). doi:10.1109/SP.2013.32 ![]() |
![]() ![]() | RYAN, P., Teague, V., Schneider, S., Joaquim, R., Heather, J., & Culnane, C. (2013). Faster print on demand for Prêt à Voter. USENIX Journal of Election Technology and Systems (JETS), 2 (1). ![]() |
![]() ![]() | RYAN, P., Benaloh, J., & Teague, V. (2013). Verifiable postal voting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). doi:10.1007/978-3-642-41717-7_8 ![]() |
![]() ![]() | RYAN, P., Peacock, T., Schneider, S., & Xia, Z. (2013). Verifiable Voting Systems. In Computer and Information Security Handbook (pp. 1103-1125). Elsevier Inc. doi:10.1016/B978-0-12-394397-2.00069-6 ![]() |
![]() ![]() | RYAN, P., & Christianson, B. (2013). Enhancements to prepare-and-measure based QKD protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 123-133). Springer Verlag. doi:10.1007/978-3-642-41717-7_14 ![]() |
![]() ![]() | RYAN, P., Schneider, S., Xia, Z., Llewellyn, M., Heather, J., & Culnane, C. (2013). Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting. 53 USENIX Journal of Election Technology and Systems (JETS), 1 (1), 53-61. ![]() |
![]() ![]() | RYAN, P., Pouly, M., & Kohlas, J. (2013). Generalized Information Theory for Hints. International Journal of Approximate Reasoning, 54 (1), 228-251. doi:10.1016/j.ijar.2012.08.004 ![]() |
![]() ![]() | RYAN, P., Demirel, D., Henning, M., van de Graaf, J., & Buchmann, J. (2013). Prêt à Voter providing everlasting privacy. Lecture Notes in Computer Science, 165-220. doi:10.1007/978-3-642-39185-9_10 ![]() |
![]() ![]() | Burton, C. B., Culnane, C., Heather, J., PEACOCK, T., RYAN, P., Schneider, S., Teague, V., Wen, R., Xia, Z., & Srinivasan, S. (2012). A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. EVOTE 2012, 1-10. ![]() |
![]() ![]() | RYAN, P., Schneider, S., Peacock, T., Heather, J., Srinivasan, S., Teague, V., Xia, Z., Wen, R., Culnane, C., & Burton, C. (2012). Using Prêt à Voter in Victorian State Elections. Electronic Voting Technology Workshop/Workshop on Trustworthy Elections. ![]() |
![]() ![]() | RYAN, P., & Coles-Kemp, L. (2012). Foreword from the Programme Chairs-STAST 2012. Socio-Technical Aspects in Security and Trust (STAST), 2012 Workshop on. doi:10.1109/STAST.2012.5 ![]() |
![]() ![]() | KHADER, D., Smyth, B., RYAN, P., & Hao, F. (2012). A Fair and Robust Voting System by Broadcast. Lecture Notes in Informatics, 285-299. ![]() |
Coles-Kemp, L., LENZINI, G., RYAN, P., & Bella, G. (2011). STAST 2011 Proc. of the 1st Workshop on Socio-Technical Aspects in Security and Trust. IEEE. |
![]() ![]() | KRAMER, S., & RYAN, P. (2011). A Modular Multi-Modal Specification of Real-Timed, End-To-End Voter-Verifiable Voting Systems. In 2011 International Workshop on Requirements Engineering for Electronic Voting Systems (REVOTE) (pp. 9 - 21). IEEE. doi:10.1109/REVOTE.2011.6045911 ![]() |
![]() ![]() | Xia, Z., Culnane, C., Heather, J., JONKER, H., RYAN, P., Schneider, S., & Srinivasan, S. (2010). Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. In Proc. 11th International Conference on Cryptology in India (IndoCrypt'10) (pp. 98–114). Springer-Verlag. doi:10.1007/978-3-642-17401-8_8 ![]() |
![]() ![]() | MAUW, S., RADOMIROVIC, S., & RYAN, P. (2010). Security protocols for Secret Santa. In Proc. 18th Security Protocols Workshop. Springer-Verlag. ![]() |