![]() ![]() | Alnahawi, N., MUELLER, J., OUPICKÝ, J., & Wiesmaier, A. (08 July 2024). A Comprehensive Survey on Post-Quantum TLS. IACR Communications in Cryptology, 1 (2). doi:10.62056/ahee0iuc ![]() |
![]() ![]() | MUELLER, J., & OUPICKÝ, J. (2024). Post-quantum XML and SAML Single Sign-On. Proceedings on Privacy Enhancing Technologies, 2024 (4). doi:10.56553/popets-2024-0128 ![]() |
![]() ![]() | MUELLER, J., Ivan Pryvalov, & Balazs Pejo. (2024). DeVoS: Deniable Yet Verifiable Vote Updating. Proceedings on Privacy Enhancing Technologies, 2024 (1). ![]() |
![]() ![]() | Haines, T., MUELLER, J., MOSAHEB, R., & PRYVALOV, I. (2023). SoK: Secure E-Voting with Everlasting Privacy. In Proceedings on Privacy Enhancing Technologies (PoPETs). ![]() |
![]() ![]() | Haines, T., MUELLER, J., & Querejeta-Azurmendi, I. (2023). Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions. Proceedings of ACM SAC Conference (SAC'23). doi:10.1145/3555776.3578730 ![]() |
![]() ![]() | MESTEL, D., MUELLER, J., & Reisert, P. (2023). How Efficient Are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis. Journal of Computer Security. doi:10.3233/JCS-230047 ![]() |
![]() ![]() | MESTEL, D., MUELLER, J., & Reisert, P. (2022). How Efficient are Replay Attacks against Vote Privacy? A Formal Quantitative Analysis. In 35th IEEE Computer Security Foundations Symposium. ![]() |
![]() ![]() | Gjosteen, K., Haines, T., MUELLER, J., ROENNE, P., & Silde, T. (2022). Verifiable Decryption in the Head. In ACISP 2022. ![]() |
![]() ![]() | Huber, N., Kuesters, R., Krips, T., Liedtke, J., MUELLER, J., Rausch, D., Reisert, P., & Vogt, A. (2022). Kryvos: Publicly Tally-Hiding Verifiable E-Voting. In 2022 ACM SIGSAC Conference on Computer and Communications Security. ![]() |
![]() ![]() | MUELLER, J. (2022). Breaking and Fixing Vote Privacy of the Estonian E-Voting Protocol IVXV. In Workshop on Advances in Secure Electronic Voting 2022. ![]() |
![]() ![]() | Haines, T., & MUELLER, J. (2021). Optimal Randomized Partial Checking for Decryption Mix Nets. In Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. ![]() |
![]() ![]() | Haines, T., & MUELLER, J. (2021). A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. In Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. ![]() |
![]() ![]() | Boyen, X., Haines, T., & MUELLER, J. (2021). Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting. In IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021. ![]() |
![]() ![]() | MUELLER, J. (2020). Ordinos: A Verifiable Tally-Hiding E-Voting System. In R. Küsters, J. Liedtke, J. MUELLER, D. Rausch, ... A. Vogt, IEEE European Symposium on Security and Privacy. doi:10.1109/EuroSP48549.2020.00022 ![]() |
![]() ![]() | MUELLER, J. (2020). SoK: Techniques for Verifiable Mix Nets. In T. Haines & J. MUELLER, IEEE Computer Security Foundations Symposium. doi:10.1109/CSF49147.2020.00012 ![]() |
![]() ![]() | Ding, J., Emery, D., MUELLER, J., RYAN, P. Y. A., & Kee Wong, V. (2020). Post-Quantum Anonymous Veto Networks. In E-Vote-ID 2020. ![]() |
![]() ![]() | Boyen, X., Haines, T., & MUELLER, J. (2020). A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing. In Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part II. doi:10.1007/978-3-030-59013-0_17 ![]() |