Login / Signup
Cryptographic vote-stealing attacks against a partially homomorphic e-voting architecture.
Nektarios Georgios Tsoutsos
Michail Maniatakos
Published in:
ICCD (2016)
Keyphrases
</>
cryptographic protocols
voting schemes
security protocols
management system
differential power analysis
cryptographic algorithms
encryption scheme
voting protocols
database systems
privacy preserving
real time
multi agent
software architecture
garbage collection
presidential election