Cryptographic distinguishability measures for quantum-mechanical states CA Fuchs, J Van De Graaf IEEE Transactions on Information Theory 45 (4), 1216-1227, 1999 | 949 | 1999 |
An improved protocol for demonstrating possession of discrete logarithms and some generalizations D Chaum, JH Evertse, J Van De Graaf Advances in Cryptology—EUROCRYPT’87: Workshop on the Theory and Application …, 1988 | 416 | 1988 |
Multiparty computations ensuring privacy of each party’s input and correctness of the result D Chaum, IB Damgård, J Van de Graaf Advances in Cryptology—CRYPTO’87: Proceedings 7, 87-119, 1988 | 363 | 1988 |
Committed oblivious transfer and private multi-party computation C Crépeau, J van de Graaf, A Tapp Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995 | 225 | 1995 |
Gradual and verifiable release of a secret EF Brickell, D Chaum, IB Damgård, J van de Graaf Advances in Cryptology—CRYPTO’87: Proceedings 7, 156-166, 1988 | 219 | 1988 |
Demonstrating possession of a discrete logarithm without revealing it D Chaum, JH Evertse, J van de Graaf, R Peralta Advances in Cryptology—CRYPTO’86: Proceedings 6, 200-212, 1987 | 182 | 1987 |
Security of quantum key distribution against all collective attacks Biham, Boyer, Brassard, Mor Algorithmica 34, 372-388, 2002 | 139 | 2002 |
A simple and secure way to show the validity of your public key J Van De Graaf, R Peralta Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987 | 121 | 1987 |
Towards a formal definition of security for quantum protocols J Graaf | 76 | 1998 |
Improving Helios with Everlasting Privacy Towards the Public. D Demirel, J Van De Graaf, RS dos Santos Araújo Evt/wote 12, 2012 | 57 | 2012 |
Oblivious transfer based on the McEliece assumptions R Dowsley, J Van De Graaf, J Müller-Quade, ACA Nascimento Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008 | 50 | 2008 |
A verifiable voting protocol based on Farnel R Araújo, RF Custódio, J van de Graaf Towards Trustworthy Elections: New Directions in Electronic Voting, 274-288, 2010 | 49 | 2010 |
Towards a publicly-verifiable mix-net providing everlasting privacy J Buchmann, D Demirel, J Van De Graaf Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 38 | 2013 |
A two-party protocol with trusted initializer for computing the inner product R Dowsley, J Van De Graaf, D Marques, ACA Nascimento Information Security Applications: 11th International Workshop, WISA 2010 …, 2011 | 30 | 2011 |
The Good, the Bad, and the Ugly: Two decades of E-voting in Brazil DF Aranha, J van de Graaf IEEE Security & Privacy 16 (6), 22-30, 2018 | 26 | 2018 |
Prêt à voter providing everlasting privacy D Demirel, M Henning, J van de Graaf, PYA Ryan, J Buchmann E-Voting and Identify: 4th International Conference, Vote-ID 2013, Guildford …, 2013 | 25 | 2013 |
Secret ballot elections with unconditional integrity D Chaum, J Van De Graaf, PYA Ryan, PL Vora Cryptology ePrint Archive, 2007 | 25 | 2007 |
Unconditionally secure, universally composable privacy preserving linear algebra B David, R Dowsley, J van de Graaf, D Marques, ACA Nascimento, ... IEEE Transactions on Information Forensics and Security 11 (1), 59-73, 2015 | 23 | 2015 |
Voting With Unconditional Privacy by Merging PrÊt À Voter and PunchScan J Van De Graaf IEEE Transactions on Information Forensics and Security 4 (4), 674-684, 2009 | 21 | 2009 |
Anonymous one-time broadcast using non-interactive dining cryptographer nets with applications to voting J van de Graaf Towards Trustworthy Elections: New Directions in Electronic Voting, 231-241, 2010 | 20 | 2010 |