Follow
Jeroen van de Graaf
Jeroen van de Graaf
Professor de Ciência da Computação, Universidade Federal de Minas Gerais
Verified email at dcc.ufmg.br
Title
Cited by
Cited by
Year
Cryptographic distinguishability measures for quantum-mechanical states
CA Fuchs, J Van De Graaf
IEEE Transactions on Information Theory 45 (4), 1216-1227, 1999
9121999
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
D Chaum, JH Evertse, J Van De Graaf
Advances in Cryptology—EUROCRYPT’87: Workshop on the Theory and Application …, 1988
4121988
Multiparty computations ensuring privacy of each party’s input and correctness of the result
D Chaum, IB Damgård, J Van de Graaf
Advances in Cryptology—CRYPTO’87: Proceedings 7, 87-119, 1988
3591988
Committed oblivious transfer and private multi-party computation
C Crépeau, J van de Graaf, A Tapp
Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995
2221995
Gradual and verifiable release of a secret
EF Brickell, D Chaum, IB Damgård, J van de Graaf
Advances in Cryptology—CRYPTO’87: Proceedings 7, 156-166, 1988
2121988
Demonstrating possession of a discrete logarithm without revealing it
D Chaum, JH Evertse, J van de Graaf, R Peralta
Advances in Cryptology—CRYPTO’86: Proceedings 6, 200-212, 1987
1861987
Security of quantum key distribution against all collective attacks
Biham, Boyer, Brassard, Mor
Algorithmica 34, 372-388, 2002
1382002
A simple and secure way to show the validity of your public key
J Van De Graaf, R Peralta
Conference on the Theory and Application of Cryptographic Techniques, 128-134, 1987
1211987
Towards a formal definition of security for quantum protocols
J Graaf
721998
Improving Helios with Everlasting Privacy Towards the Public.
D Demirel, J Van De Graaf, RS dos Santos Araújo
Evt/wote 12, 2012
562012
Oblivious transfer based on the McEliece assumptions
R Dowsley, J Van De Graaf, J Müller-Quade, ACA Nascimento
Information Theoretic Security: Third International Conference, ICITS 2008 …, 2008
492008
A verifiable voting protocol based on Farnel
R Araújo, RF Custódio, J van de Graaf
Towards Trustworthy Elections: New Directions in Electronic Voting, 274-288, 2010
482010
Towards a publicly-verifiable mix-net providing everlasting privacy
J Buchmann, D Demirel, J Van De Graaf
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
372013
A two-party protocol with trusted initializer for computing the inner product
R Dowsley, J Van De Graaf, D Marques, ACA Nascimento
Information Security Applications: 11th International Workshop, WISA 2010 …, 2011
282011
The Good, the Bad, and the Ugly: Two decades of E-voting in Brazil
DF Aranha, J van de Graaf
IEEE Security & Privacy 16 (6), 22-30, 2018
242018
Prêt à voter providing everlasting privacy
D Demirel, M Henning, J van de Graaf, PYA Ryan, J Buchmann
E-Voting and Identify: 4th International Conference, Vote-ID 2013, Guildford …, 2013
242013
Secret ballot elections with unconditional integrity
D Chaum, J Van De Graaf, PYA Ryan, PL Vora
Cryptology ePrint Archive, 2007
232007
Unconditionally secure, universally composable privacy preserving linear algebra
B David, R Dowsley, J van de Graaf, D Marques, ACA Nascimento, ...
IEEE Transactions on Information Forensics and Security 11 (1), 59-73, 2015
222015
Anonymous one-time broadcast using non-interactive dining cryptographer nets with applications to voting
J van de Graaf
Towards Trustworthy Elections: New Directions in Electronic Voting, 231-241, 2010
212010
Voting With Unconditional Privacy by Merging PrÊt À Voter and PunchScan
J Van De Graaf
IEEE Transactions on Information Forensics and Security 4 (4), 674-684, 2009
212009
The system can't perform the operation now. Try again later.
Articles 1–20